Tracer

The true value of an ecfirst Vulnerability Assessment is an effective process to continuously secure your enterprise.

Potential security gaps or flaws can be identified and fixed before they allow intrusion.

A high percentage of risk is from known vulnerabilities, however, thousands of new vulnerabilities are discovered each year affecting software, browsers, operating systems, applications, other IT assets and processes.

ecfirst enables you to gain an awareness of vulnerabilities in your environment to be able to react accordingly.

Vulnerability Assessment outcomes drive remediation prioritization and also smarter, targeted penetration testing.

  • External Assessment
    • Examines internet-facing infrastructure, network and systems.
    • Includes, but is not limited to such systems as:
      • Internet or DMZ/perimeter network servers
      • Internet screening routers
      • Internet-facing firewalls
      • E-mail servers
      • DNS servers
      • Servers for storing/processing ePHI
      • Web applications
      • Other systems as required
    • DNS system configuration review
    • Reconnaissance activities related to metadata available in publicly accessible documents and Google Hacking Database entries
    • Web site/application review for issues related to the OWASP Top 10
  • Internal Assessment
    • Identity and Access Management review
    • Password policy and credential review
    • Removable media review
    • SNMP settings
    • SQL server segmentations and access review
    • Networked systems
  • Firewall Assessment
    • Rule-based configuration
    • Operating system, patch revision release levels
    • Security settings review
  • Wireless assessment
    • Wireless networks are particularly vulnerable to attack due to the inability to prevent physical access. The only advantage is that an attacker had be in relative physical proximity. Newer antenna technology now permits access from a wider perspective.
      • Location wireless assessment
      • Discovery of visible wireless access points
      • Identify potentially rogue devices and access points
      • Review of authentication and encryption in use
      • Testing of wireless segmentation
  • Social engineering assessment
    • Employees and contractors are often the weakest link of otherwise well-intended security controls. Authorized members of the workforce have authenticated access to information systems, physical access to facilities and secured areas. Physical or electronic exercise to identify gaps to compromise asset.
      • Access testing to facilities, secure areas, documents, credentials, confidential information.
      • Security bypass testing for data access.
      • Includes bypass testing of electronic, personnel and procedural controls.
      • Documentation and report of these exercises, including information obtained.
A proven methodology that addresses the details, conditions, requisites and mandates of each regulatory standard. Vulnerability assessments are part of a bizSHIELDtm program, along with validation, remediation recommendations and implementation timelines. A bizSHIELDtm report is an actionable, documented risk analysis and summary and may be used as evidence for addressing compliance mandates.
ecfirst

Trusted by the industry with proven methodology and results

18

Years of experience

25,000+

People trained & certified
by ecfirst

1,000+

Satisfied Customers

In the News

ecfirst will be delivering a featured session on Cyber Immune Defense: HITRUST Delivers an Active Defense.

Events

Cyber Immune Defense, Featured Presentation by Ali Pabrai at ISSA/ISACA/ISC2 Phoenix Security Conference, Sept. 20, 2018

Thought Leadership

Ali Pabrai, MSEE, CISSP (ISSAP, ISSMP), CCSFP (HITRUST) is the chief executive of ecfirst, an Inc. 500 business. He is a highly regarded information security and regulatory compliance expert.