Subscribe

Vulnerability risk assessment services

Simplifying your cyber security strategy.


Cape Town, 13 Feb 2017

KHIPU's vulnerability assessment services enable organisations to understand their risks to cyber attacks by highlighting the critical areas where they are vulnerable and could be compromised. Once the vulnerabilities are known, a best-practice approach to cyber security with recommendations for both on-going protection and future prevention can then be provided to reduce the exposure of a cyber attack, mitigate the risk and simplify your cyber security strategy. Its vulnerability risk assessment services address the following areas within an organisation:

* Users - Identify your risk to phishing attacks.
* Endpoints - Identify what is and shouldn't be on your network.
* Application - Identify what applications your workforce are using.
* Infrastructure - Identify what your vulnerabilities are.

User Vulnerability Risk Assessment and Awareness Training - Identify your risk to phishing attacks

The service identifies the 'risk factor' and how vulnerable the organisation is to phishing attacks:

* Users: Do they open phishing e-mails and how many could be compromised by providing information.
* Infrastructure: Are e-mail systems, spam filters, firewalls etc configured correctly or capable of protecting against a phishing attack?
* Processes: How do users / IT helpdesk departments etc react to phishing e-mails?
* Devices: What operating systems, web browsers and plug-ins are being used, are they vulnerable?
* Prevention report: Highlighting "what is the risk" with best practice recommendations including training plans, solutions and services for on-going prevention and to reduce the risk of being compromised.
* Cyber Security Awareness Training: To educate the users on phishing; the risks, impact, how to identify and what to do (see below CSAT).

Endpoint Vulnerability Risk Assessment - Identify what is and shouldn't be on your network

A large number of cyber breaches are a result of unauthorised / unknown devices that have been plugged into the corporate network and used to access and harvest confidential information. Today, many organisations do not have complete visibility of what is actually on their network. This service provides a complete view of all endpoints that are connected, whether on wired or WiFi, so that you can identify what should and shouldn't be on your network. The report includes:

* Endpoints: A full inventory of everything on the network; computers, servers, i-devices, printers, CCTV, clinical devices etc.
* Location: Where they are connected e.g. network switch port, WiFi access point.

Application Visibility and Risk Assessment Service - Identify what applications your workforce are using

Many perimeter security systems are unable to identify network traffic at the application level therefore cannot protect against zero-day malware attacks, let alone determine if applications should be used by the workforce. This service provides a risk assessment based on the analysis of the application traffic traversing the network, taking into account the different types of applications, how they are being used and the relative security risk.

* Applications including Software As A Service (SAAS) in use.
* Traffic activity including URL and file transfer analysis.
* High-risk applications; total threats, vulnerability exploits and malware.
* Prevention report: Best practice recommendations including solutions and services for on-going prevention and to reduce the risk of being compromised.

Infrastructure Vulnerability and Risk Assessment Scan - Identify what your vulnerabilities are

This service scans your external and internal infrastructure for vulnerabilities, details all findings and provides best-practice recommendations for immediate and future prevention.

* Vulnerabilities including software flaws, defaults or miss-configurations and unauthorised or unsuspected installations.
* Compliance and Policy deviations and violations.
* Service Impact of the vulnerability.
* Prevention report: Best practice recommendations including solutions and services for on-going prevention and to reduce the risk of being compromised.

Cyber Security Awareness Training Services (CSAT)

To complement our User Vulnerability Risk Assessment and Awareness Training services, we can provide classroom training to raise the awareness of the risks of cyber and phishing attacks, and how they can affect your personal and work life. The agenda covers all key areas around cyber security and phishing awareness including Cybersecurity 101, phishing: what is it, the facts and threats to your personal and work life, detection and avoidance and cyber security awareness quizzes. This has been very effective in order to reduce the on-going risks of cyber attacks.

If you would like to know more about our vulnerability risk assessment services and solutions, please contact KHIPU Networks: Sales@khipu-networks.com, (041) 004 2352.

@KhipuNetworks
www.khipu-networks.com

Share

Editorial contacts