|
|
|
|
|
|
|
|
Business Benefits: |
|
|
Affordable
one-time cost |
|
Objective,
independent perspective on your
organization's security exposure, for
communication to internal, external
stakeholders |
|
Reduced
risk of legal liability from security
breaches or illegal use of corporate systems |
|
Maintained trust from customers, suppliers, partners in
confidentiality of sensitive information and availability of
business-critical applications |
|
Avoidance of
lost productivity, revenue loss from downtime
of business-critical applications or
compromised corporate data |
|
|
IT Benefits: |
|
|
Data gathering
is largely automated, and non-intrusive,
with limited disruption to operations |
|
Results are easy
to interpret in a management-friendly
"scorecard" format, with clear,
actionable, well-researched recommendations
|
|
Employs a
combination of active and passive scanning
techniques
for the most comprehensive identification of
multiple types of security vulnerabilities |
|
Assesses
vulnerabilities in people as well as
technology
using sophisticated password-cracking
techniques |
|
|
Best Suited For: |
|
|
Companies needing an initial benchmark of their vulnerability
to technology and personnel-based "social engineering"
attacks |
|
Organizations looking to complement or
refresh a prior security audit |
|
Corporate security managers wanting to
validate adherence to security policies and
procedures |
|
|
Technologies Employed: |
|
|
|
|
|
|
|
|