Organizations' security boundaries have grown to include cloud infrastructure, virtual environments, mobile devices, and IOT, and with this growth has come increased risk. With some of the most experienced Network Security Engineers in the Industry, we believe in being proactive, not reactive. With our Security Assessment Services we help you get ahead of the problem.
At Cerdant, our mission is simple, we provide our clients with the tightest security posture, highest performing and highest available IT networks, period. We have been in business since 2001 and actively protect over 10,000 network connections
- Gartner
Take the first step towards reducing your stress and improving the health of your network today!
A normal business firewall will experience dozens of configuration changes per year. Rarely are these changes examined by a security professional before being made. Cerdant over the past 18+ years has become experts in all things firewalls and networking. We use this extensive knowledge to review, analyze & make recommendations about the current state of your firewall configuration.
First and foremost, Cerdant looks at your configuration through a security-minded lens. Cerdant can and will make recommendations about network optimizations. It is our goal to make sure that your firewall and network are performing in the most secure manner but with top-notch performance as well.
Assessment Includes:
Data Collection
Interview
Examination
Evaluation
Findings Report
Remediation Recommendations
External vulnerability scanning isn't just for checking a compliance box. Holes in externally facing systems and network infrastructure are an all too common point of entry into networks in all business verticals for cybercriminals.
Our Vulnerability Assessment service takes security review beyond the firewall to scan your perimeter for threats like remote file inclusion, cross-site scripting, SQL injection and a variety of other application and network-based security gaps. We will provide a detailed report on where vulnerabilities exist, as well as remediation recommendations.
Assessment Includes:
External Vulnerability Scan
Examination
Evaluation
Findings Report
Remediation Recommendations
It is important to know where security weaknesses lie and the steps to take to correct them, but Cerdant's Penetration Testing Service provides an even more granular level of visibility. By attempting to compromise identified weaknesses and access restricted data, Cerdant's Certified Penetration Testing Professionals are able to simulate attacks under a variety of conditions giving your organization full visibility into what extent your systems and information are at risk.
Test Includes:
External Vulnerability Scan
Examination
Evaluation
Exploit Vulnerabilities
Findings Report
Remediation Recommendations
Email phishing is one of the most common and most successful attack methods used by cybercriminals; that is why regular employee education and knowledge evaluation is essential.
Cerdant empowers organizations to regularly assess their employee's ability to properly identify and report phishing emails through monthly or quarterly simulated phishing campaigns.
Enrollment in training is also an option for those who don't pass their phish-test. These regular assessments will allow you to exponentially reduce your largest attack surface, your end-users.
Assessment Includes:
Data Collection
Interview
Campaign Design
Reporting
Training