Home > Solutions > Information Security > Security Assessment
Security Assessment
digital media

CBTS' security consultants have extensive experience in identifying, defining, and classifying vulnerabilities within network infrastructures. We work with our customers to develop a strategy that encompasses all potential security issues. If an attack occurs, we define and implement ways to minimize the consequences.

CBTS can deploy our experienced team of Certified Ethical Hackers to examine every component of your network, including:

  • Vulnerability Assessment
    Our Vulnerability Assessment Services provides an in-depth,
    360-degree security analysis of your network so that your
    enterprise can protect its critical data and operating system from internal and external security threats.
  • Penetration (PEN) Testing
    Our PEN Testing Services evaluates the security of a computer system or network by simulating an attack from a malicious source. After identifying critical vulnerabilities, CBTS consultants will attempt to exploit those vulnerabilities, hoping to illustrate what malicious code or hackers could do to your network.
  • Red Team Assessment
    This assessment goes far beyond the traditional vulnerability scan or penetration test. It holistically examines an organization's defenses, processes and users, and identifies less obvious weaknesses. The testers act like attackers - with the goals of breaking into a secured host or network, gathering information, or establishing control.
  • Firewall Rule Base Audit
    This policy review will audit and analyze firewall configurations and rule bases to ensure that the highest levels of protection and performance are achieved.
  • Data Loss Prevention (DLP) Assessment
    Organizations that are interested in deploying a DLP system need to assess facets of their business and their users' behavior before choosing a product or designing a solution. CBTS helps organizations identify the data that is essential to protect. This may include customer data (Personally Identifiable Information - PII / Personal Health Information - PHI), financial data, intellectual property, internal documentation, account information or credentials, or state secrets and intelligence.
  • Malware Assessment
    Our engineers work with you to perform a complete review of your Virus, Malware, and Spam defenses. Your administrative, maintenance, and software-updating practices will also be examined.
  • Security Program Gap Analysis
    This gap analysis provides our customers with a structured process for developing the design of a new security program framework or evaluating an existing framework. The process directly incorporates regulatory compliance and technical controls to define the initial security posture of the organization.
  • Wireless Security Assessment
    CBTS can conduct a thorough review of your existing wireless security policies, system configurations and architecture, and operation procedures. A road map for remediation is provided if security gaps are discovered.
  • Web Application Assessment
    Our Web Application Assessment analyzes the current controls governing your web applications to help avoid breaches unique to web-based applications.
  • Social Engineering
    In this assessment, CBTS will orchestrate a social engineering attack, by leveraging human interaction (social skills) to obtain or compromise information about an organization or its computer system. We then use that information to further penetrate your network defenses.

Each step of the assessment is documented, managed and securely shared with our customers at our encrypted, rights-managed Secure Case Manager (SCM) portal.

   


Case Studies
White Papers
Download Product Information
“Cincinnati Bell (Technology Solutions) was seamless. Everything went just as planned. They worked over the weekend and overtime. Everything was on time and on budget. We were very satisfied with their service."
Keith McCluskey, CEO, McCluskey Chevrolet
CBTS > Solutions