Cyber Threat Assessment
ASSESS IT THREATS WITH ANALYSIS OF DATA FLOWS
ASSESS IT THREATS WITH ANALYSIS OF DATA FLOWS
Businesses work in increasingly complex network environments. On the one hand, they have to face continuous cyber attacks and defend themselves from data breach threats, on the other hand they are themselves undergoing a digital transformation, which leads to a growth of applications, devices and cloud environments, often distributed across multiple locations.
As a result, traditional defenses are no longer enough, and organizations that rely on outdated security controls may be more at risk than they realize.
The Cyber Threat Assessment is a validation test that aims to assess the degree of security of the corporate network. It is a computer threat assessment program based on the analysis of data flows that travel from the internal company network to the outside via the Internet and vice versa.
The test involves positioning a probe for a maximum period of seven days in the perimeter area of the corporate network, between the firewall and the internal network. The probe records information on activity to and from the Internet and / or to and from any remote locations, providing an in-depth look at the current state of the corporate IT network.
The probes do not affect daily operations and the detection of data flows is carried out in compliance with national and European legislation on privacy and data protection.
At the end of the data collection Lan & Wan Solutions will deliver to the customer a report of the activities and information obtained. The report will indicate the key recommendations for improving corporate Cyber Security.
The report is divided into three main sections:
This section of the report shows which applications are used on the customer’s network and how they are used, including whether they connect to internal or external resources. Knowing which applications communicate externally is important because it allows the company to:
The report ranks applications based on their business importance and bandwidth usage based on categories such as VoIP, video, collaboration, social media, and more.
This section of the report examines the high-risk applications used within the corporate network (LAN) and gives indications on how traffic from branch offices and / or the Internet could be protected.
The information allows you to understand if you need to quickly update or increase the security infrastructure, showing the vulnerabilities of applications in the network and in devices at risk.
This highlights the risks that can accompany technologies such as SD-WAN, if security is not integrated with advanced devices such as Next Generation Firewalls.
Here the report examines the traffic on the origin of the IP address, to determine the country of origin of specific requests. This helps IT teams identify botnets or remote access sessions that could indicate targeted attacks.
The report also illustrates bandwidth usage per hour and where it can be optimized for applications.
In this regard, Lan & Wan Solutions provides added value by suggesting advice on where WAN connections can be made more convenient without damaging the end user experience.
Thanks to the Cyber Threat Assessment, our customers will have:
Greater awareness of the problems and gaps in the controls currently in place on the corporate perimeter
Precise indications on the actions to be taken to improve network security
Optimized productivity and performance as the remedial actions provided with the consultancy support are adopted upon delivery of the report
Precise indications on the actions to be taken to improve network security
Ability to estimate and manage the budget to be dedicated to security with greater reliability and to obtain the most from the technological investments made for the management of geographic connections.