Sie sind auf Seite 1von 4

New Offering 2013 Cyber Security Check - up Services

How "healthy" is your cyber security program? When was the last time you checked? Do you have the resource and time to review your current security control processes?

Marlabs Cyber Security Check-up Services

Introduction to Cyber Security Check-up Services


In order to ensure your security program is operating at peak performance at all times, it makes sense to have certified trained experts perform periodic check-ups. How "healthy" is your cyber security program? When was the last time you checked? Do you have the resources and time to review your current security control processes? Marlabs Cyber Security Check-up Services provides your organization with focused, detailed, advisory reports that include: assessment, reviews, and recommended corrective action plans of your security controls. If you choose; Marlabs will even perform the corrective action steps for you and/or assist your IT/Security staff in doing so. Our Cyber Security Check-up Services include: Firewall Security Check IDS/IPS Assessment & Tune-up Business Partner & Vendor Security Risk Assessment Planning Secure Disposal Planning Employee Security Awareness Program Development Security Awareness Testing: Spear Phishing Social Engineering Scans Mobile Device Security Assessment Cyber Security & Performance Monitoring We also provide Security Staff Augmentation in a multitude of cyber security disciplines.

Firewall Security Check


Service Includes: Assessment of Firewall Security Policy This involves the review/testing of the following: o Policy review & testing o Rule-set & mplementation Approach o Maintenance & Management o Physical Security of Firewall Environment o Information Security Policy Firewall Administration Access: o Access to the Platform o Platform Operating System Builds o Failover Strategies o Logging Functionality.. o Security Incidents o Backups

IDS/IPS Assessment & Tune-up


Service Includes: Fine Tune Security Capabilities o Information Gathering & Logging o Detection & Prevention Management o Implementation Review o Operation and Maintenance

Business Partner and Vendor Risk Assessment Planning


Service Includes the review of vender security in the following security area domains: Organization Employee Security Focus Change, Identity, & Event Management Network, Application, & System Security

Secure Disposal Planning


Service Includes Information Sanitization & Disposition Decision Making: Information decisions in the system life cycle Identification of the need for media sanitization Determination of security categorization Reuse & Control of media Sanitization and disposal decisions Verification Methods Review, develop, and/or revise documentation

Social Engineering Scans


Gather Intelligence

Services

Establish Trust

Exploit Trust
Use Information

Exploit the Following Threat Vectors

Vectors

Phone

Personal

Employee Security Awareness Program Development


Service Includes: Designing Awareness & Training Programs o Structuring Client Awareness & Training o Conducting Needs Assessment o Developing Strategy and Plan o Establishing Priorities o Addressing Funding & Training Developing Material Implementing Programs

Online Trash Reverse

Mobile Device Security Assessment Security Awareness Testing - Spear Phishing


Leverage NEXPOSE SOCIAL SCAN Perform variations of Spear-phish attacks Produce results report Recommend corrective actions Service Includes: Wireless Scan Mobile Device Strategy Assessment Mobile Device Security Control Domain o Mobile Asset Inventory o Mobile Device Provisioning o Mobile Software Distribution o Mobile Security Management o Mobile Device Protection o Monitoring and Help Desk Support o Managing Diversity of Mobility Platforms 2

Cyber Security & Performance Monitoring Tiger Team


Service Includes: Red Team Methodology: Information and Intelligence Gathering Threat Modeling Vulnerability Analysis and Exploitation Risk Analysis and Quantification Reporting

Cyber Security Staff Augmentation


Service Includes: Cyber Security Workforce Framework Specialty Areas Include: Operate & Maintain Security Provision Analyze Operate & Collect Support Protect & Defend Investigate

Securely Provision: Concerned with conceptualizing, designing, and building secure IT systems Operate & Maintain: Responsible for providing support, administration, and maintenance necessary to ensure effective and efficient IT system performance and security Investigate: Responsible for investigation of cyber events or crimes which occur within IT Systems and networks Collect and Operate: Responsible for the investigation of cyber events or crimes which occur within IT Systems and networks Analyze: Responsible for highly specialized and confidential information that may develop intelligence Oversight & Development: Provide critical support so others may conduct their cyber security work

Marlabs Inc. One Corporate Place South, Piscataway NJ 08854 For more information, please call us at +1(732)-694-1000 or email us at sales@marlabs.com www.marlabs.com
Copyright 2013 Marlabs Inc. All rights reserved. Due to specific non-disclosure agreements in force, project references and further details can be provided only on request.

Das könnte Ihnen auch gefallen