|
 |
|
The SYBOR Configuration and Risk Assessment Service extends visibility beyond the network perimeter to the application layer to help you achieve broader compliance and more effective identification and mitigation of security threats using NetIQ products. For example, NetIQ Secure Configuration Manager can audit and report on inappropriate permissions in Active Directory, which can result in too little or too much power over directory objects. Similarly, unused user accounts or too many administrator level accounts are security gaps, as are software patches not applied. This service helps you protect your Windows systems from exploits and lowers your IT risk level by identifying those security issues needing immediate attention. Our comprehensive, monitoring service collects, analyzes and performs policy configuration assessments and produces scored risk results for all critical systems.
This service provides your enterprise with real time, 24x7x365 monitoring and response across your critical IT assets. SYBOR trained security experts will perform all activities necessary to keep the IT infrastructure secure and compliant including:
|
 |
Site assessments
|
 |
Monitoring policy design, monitoring tool installation and configuration |
 |
Security & Compliance monitoring and incident management; Comprehensive reporting and response |
|
|
|
|
|
SYBOR experts assist with critical vulnerability and threat identification and recommend policy templates to be used for security and vulnerability assessment that is just right for your environment. |
With our flexible information management architecture and proven processes, we can quickly develop support for new or custom data sources. |
Assessment data is archived for secure, review, sorting, and reporting for internal audit purposes or to assist with reporting related to compliance with Payment Card Industry (PCI), Sarbanes-Oxley, and other requirements. |
Best-of-breed technologies and structured processes used to correlate and analyze data to detect security threats and exposures. Customers receive reports with prioritized response. |
When combined with data from firewalls, IDS/IPS sensors, and vulnerability scans, SYBOR can more accurately and efficiently identify those security events that represent real threats. |
|
|