security readiness profile
DESCRIPTION
We'll help reveal the vulnerabilities in your business networks by comparing them to industry best practicesTRANSCRIPT
![Page 1: Security Readiness Profile](https://reader034.vdocuments.site/reader034/viewer/2022051513/5462d905af7959236a8b8274/html5/thumbnails/1.jpg)
Security Readiness Profile
An Objective View of Your Network Security
![Page 2: Security Readiness Profile](https://reader034.vdocuments.site/reader034/viewer/2022051513/5462d905af7959236a8b8274/html5/thumbnails/2.jpg)
What is aSecurity Readiness Profile?
A pds2k.com Security Readiness Profile compares your physical network, operating policies and procedures against industry standards. This reveals the vulnerable areas in your business operations that need immediate attention.
![Page 3: Security Readiness Profile](https://reader034.vdocuments.site/reader034/viewer/2022051513/5462d905af7959236a8b8274/html5/thumbnails/3.jpg)
The First Steps On-site review of your network security by a pds2k.com technician
Meeting with you and your IT staff to review initial findings
Develop a written summary of findings, with recommendations to improve security
Meeting with you and your IT staff to review the summary report and recommendations
![Page 4: Security Readiness Profile](https://reader034.vdocuments.site/reader034/viewer/2022051513/5462d905af7959236a8b8274/html5/thumbnails/4.jpg)
The Elements Reviewed in a
Security Readiness Profile Data Access Firewalls Internet Virtual Private Networks (VPN) Network Routers Access and Authentication Virus Management LAN Security Backup and Contingency Disaster Recovery
![Page 5: Security Readiness Profile](https://reader034.vdocuments.site/reader034/viewer/2022051513/5462d905af7959236a8b8274/html5/thumbnails/5.jpg)
Section 1: Data Access Reviews password security practices;
File protection mechanisms;
PC/Workstation security, and;
Security policies for data archiving and disposal
![Page 6: Security Readiness Profile](https://reader034.vdocuments.site/reader034/viewer/2022051513/5462d905af7959236a8b8274/html5/thumbnails/6.jpg)
Section 2: Firewalls Reviews firewall setup and
redundancy;
Security configurations, such as packet filters and proxies;
Monitoring practices; and
In-bound and out-bound Internet security
![Page 7: Security Readiness Profile](https://reader034.vdocuments.site/reader034/viewer/2022051513/5462d905af7959236a8b8274/html5/thumbnails/7.jpg)
Section 3: Internet Reviews Gateway architecture;
Internet Acceptable Use Policy (IAUP); use of Proxy Services, and;
Monitoring policies and procedures;
Provides recommendations to increase Internet security to prevent intrusion.
![Page 8: Security Readiness Profile](https://reader034.vdocuments.site/reader034/viewer/2022051513/5462d905af7959236a8b8274/html5/thumbnails/8.jpg)
Section 4: Virtual Private Networks (VPN)
Reviews current VPN security policy and enforcement practices
Reviews VPN authentication mechanisms and monitoring
Provides recommendations to maintain fast, reliable, secure communications at all times
![Page 9: Security Readiness Profile](https://reader034.vdocuments.site/reader034/viewer/2022051513/5462d905af7959236a8b8274/html5/thumbnails/9.jpg)
Section 5: Network Routers Reviews physical security of Network
routers and preventative maintenance practices
Reviews password management, interactive access controls, management services and logging
Provides recommendations to prevent catastrophic failure of your network
![Page 10: Security Readiness Profile](https://reader034.vdocuments.site/reader034/viewer/2022051513/5462d905af7959236a8b8274/html5/thumbnails/10.jpg)
Section 6: Access & Authentication
Reviews PC/Workstation security;
User access controls;
OS and software update policies;
Logging and data collection mechanisms, and;
Backup configurations
![Page 11: Security Readiness Profile](https://reader034.vdocuments.site/reader034/viewer/2022051513/5462d905af7959236a8b8274/html5/thumbnails/11.jpg)
Section 7: Virus Management Reviews virus detection mechanisms;
Anti-Virus software update schedules;
Policies regarding removable media devices, and;
Procedures for investigating, reporting and documenting virus incidents
![Page 12: Security Readiness Profile](https://reader034.vdocuments.site/reader034/viewer/2022051513/5462d905af7959236a8b8274/html5/thumbnails/12.jpg)
Section 8: LAN Security
Reviews your organization’s LAN security and policies
Defines our proven method to Harden/Secure, Prepare, Detect and Respond to LAN security issues before they become a problem
![Page 13: Security Readiness Profile](https://reader034.vdocuments.site/reader034/viewer/2022051513/5462d905af7959236a8b8274/html5/thumbnails/13.jpg)
Section 9: Backup & Contingency
Reviews the security of your backup systems, capacity and strategies
Reviews your protection mechanisms for backup and verification
Provides recommendations to develop a business continuity plan
![Page 14: Security Readiness Profile](https://reader034.vdocuments.site/reader034/viewer/2022051513/5462d905af7959236a8b8274/html5/thumbnails/14.jpg)
Section 10: Disaster Recovery An assessment of your vulnerabilities
to both natural and man-made disasters
Determines whether your Disaster plan can effectively meet your company’s projected needs
Provides recommendations to update and test your Disaster plan
![Page 15: Security Readiness Profile](https://reader034.vdocuments.site/reader034/viewer/2022051513/5462d905af7959236a8b8274/html5/thumbnails/15.jpg)
The Final Steps Meeting with you and your IT staff to
review the SRP report and our recommendations
Prioritize actions to provide an efficient, reliable and secure business network
Determine the amount of assistance required from our technical team to make it happen
![Page 16: Security Readiness Profile](https://reader034.vdocuments.site/reader034/viewer/2022051513/5462d905af7959236a8b8274/html5/thumbnails/16.jpg)
About
Progressive Data Systems, Inc. was incorporated in 1990 by Bill Correll. For the next five years, pds2k.com continued to expand and serviced almost 600 clients.
Between 1998 and 2001, the company changed focus to become an Internet service provider, and concentrated on providing computer networking consulting and service to medium-sized business, town offices, and social service agencies.
Since 2003, pds2k.com has concentrated on finding ways to bring more value to their network clients by continuing to develop expertise in all areas of Internet and network security consulting.