Security Threat Assessment Report (STAR)

Security Threat Assessment Report

Our STAR service will help you develop and understanding of your current security posture; identify likely threats and the potential vulnerabilities in your Security strategy, helping you to develop and organisation that is resilient to cyber threats.

Network and Perimeter Security

We will review your network and advise on best practices to include the following infrastructure:

  • Firewalls
  • Wireless
  • SIEM
  • Application Flow and Control
  • Intrusion Prevention System (IPS)
  • Unified Threat Management (UTM)
  • Architecture Review and Design
  • Virtual Private Network (IPsec&SSL)
  • Identity and Access Management (IAM)
  • Network Access Control (NAC)
  • Virtual Security Appliances

Endpoint Security for Desktops and Servers

We will work with you to review your existing infrastructure to ensure both your  desktops and servers are protected against malicious and prevent data loss or breach.

  • Antivirus
  • Web & Mail Filtering
  • Content-control software
  • Encryption
  • Data Loss Prevention (DLP)
  • Host Intrusion Prevention Systems (HIPS)
  • Anti-Spyware/Malware
  • Server Forensic

Protect Your Company

Request a Meeting