ERE Information Security Auditors
Home | Site Map | Contact Us | Cyber Security News | Resource Center
This text is replaced by the Flash movie.
list of IT security and compliance audit steps
ERE Differentiators from other vendors

Network Device Discovery Audit

The sheer number of IT assets, their complex relationships and the frequent changes they undergo in most corporations has made their update and maintenance both difficult and vastly time consuming.

Additionally new technology which can be implemented by users without formal approval from the IT department, such as memory sticks, USB devices, wireless access points, Blackberries, PDAs, cell phones, and foreign applications, complicates the missions of:

  • Maintaining an accurate inventory of devices / software.
  • Enforcing policy.

Users that run unauthorized, surprise, and dangerous services on their workstations and over the Internet makes the lives of security operation staff miserable.  ERE’s auto discovery services identify and document the inventory of hardware, software, and Internet services running on an enterprise network.  The inventory includes:

  • Servers and workstations.
  • Security devices.
  • Telecommunications devices.
  • USB devices, stick memory, wireless access points, Blackberries, PDAs, cell phones, modems.
  • Software tools and software applications.
  • Internet services that are running.
  • User traffic patterns, to highlight anomalous traffic patterns, unusually high volumes potentially initiated by worm / Trojan / virus infection.
 

Contact Us

905 764 3246

 
 
  Budgetary Price Quote
  10 minute scope definition call
  ROI Calculation for your next Audit 
  Sanitized Statement of Work
  Sanitized Audit Report
  Product Literature  
  White Papers and Published Articles
   
  Please see Ron Lepofsky’s book,
The Manager’s Guide to Web Application Security,
published by Apress Media

http://www.apress.com/9781484201497

The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively.

 
Home | Technology Audits | Compliance Audits | Process Audits | Doc Audit/Authorship| | 7x24 Monitoring | Knowledge Transfer
ERE Differentiators | About Us | Site map | Contact Us | |   | Resource Center
Copyrights © 2007-2008. All rights reserved.  

   AddThis Social Bookmark Button