Cyber Threat Assessments

Overview:

The objective of our Cyber Threat Assessment is to identify security risks within your organization and allow you to understand what is happening on your corporate network. Our third-party assessment will provide you with unique insights into your network and allow you to evaluate the efficacy of your existing security controls, appliances, and tools and identify gaps within your security posture.

How it Works:

Without disrupting your existing network, we will monitor your internal traffic for up to one week. We accomplish this by deploying a state-of-the-art Next Generation Firewall appliance within your existing network in either Sniffer Mode or inline to minimize disruption to your network. We then collect log traffic for approximately 3-7 days depending on your environment. Once the collection period has ended, we will investigate findings and create a custom security report for your organization that inlcudes the following:

  • An executive summary that summarizes the key findings of the assessment

  • Vulnerabilities and Malware

  • High-risk applications

  • At-risk devices or hosts

  • Web applications (SaaS, Peer to Peer, Remote Access, Gaming, Social Media, etc.) usage

  • Bandwidth by hour and source/destination

  • Top sources and destinations by countries

  • Recommendations to make your environment more secure

After the Assessment Has Been Completed:

Once we’ve compiled the results of your assessment and generated your custom report, we will meet with your organization to discuss the findings and review threats that were identified. You can then take actions internally to remediate the threats and issues identified, or you can extend your relationship with Cytechnica and we will work together to secure your environment and key data by developing and executing a custom cyber risk management plan for your organization.