Issuu on Google+

SERVICES & TECHNOLOGY OVERVIEW


PROFESSIONAL SERVICES ENTERPRISE SECURITY REVIEW

ISO 27002 Implementation / 27001 Certification

It’s important to understand that there is more to security than virus protection and a patch management strategy. Although necessary, these are simply components, and when deployed and managed properly, can help ensure that one’s Enterprise remains secure. Policy and Process implementation are just as important and often overlooked. Administrative, Technical and Physical controls all play a role in the Information Security arena. Quadrant’s Enterprise Security Review is a complete assessment of your enterprise security program. The review is modular allowing for all or any one of the following components to be assessed:Quadrant can assist with your PCI initiatives by conducting full PCI Gap Reviews, helping with remediation efforts, or simply by being there to provide guidance around how to limit scope and validate compensating controls.

ISO 27002 is a code of practice around information security commonly used as a baseline to build out a security program or what is now referred to as a Information Security Management System (ISMS) for those looking for ISO 27001 certification. Customers throughout the globe are often challenged with choosing a defined set of controls that can help secure their environment and satisfy a form of compliance. The ISO 27001 certification does just that, as well as communicate to internal staff, potential business partners and shareholders that the ISMS in place is based on a proven internationally recognized standard.

Internal / External Vulnerability Assessment

Internal / External Penetration Testing Study

Application Security Testing (Grey Box)

Policy / Procedure / Process Gap Review

Wireless Security Testing (War Driving)

VOIP Security / Dialing Exercise (War Dialing)

Social Engineering

Payment Card Industry (PCI) Consulting More and more organizations today are accepting the 5 major card brands as a form of payment. Visa, MasterCard, Amex, Discover and JCB all mandate the adoption of the PCI DSS along with various reporting and validation requirements depending on card transaction volume. Enterprises today must make certain cardholder environments satisfy the PCI DSS on a continuing basis. Quadrant can assist with your PCI initiatives by conducting full PCI Gap Reviews, helping with remediation efforts, or simply by being there to provide guidance around how to limit scope and validate compensating controls.

Regulatory Compliance Consulting In today’s computing environment, the demand for secure data transmission and storage, separation of duties and security best practices are becoming more and more prevalent. Sarbanes Oxley, GLBA, HIPAA, just to name a few are mandates requiring companies in all verticals to communicate compliance on an annual basis. Quadrant can help customers make sense of these laws and develop the strategy needed to satisfy them.

WWW Application Security Testing Quadrant’s Application Security review is a comprehensive assessment of an enterprise application with the sole purpose of identifying application layer misconfigurations, lack of secure coding best practices and other common application vulnerabilities that could lead to system compromise. Our holistic approach, coupled with an internally developed and proven methodology, helps our customers uncover web application deficiencies before the unauthorized user does.

Staff Augmentation / Resources Quadrant understands that professional services and deliverablebased work aren’t always needed. Occasionally organizations simply need qualified Information Security professionals to assist with remediation work, product deployment or even a Project Manager to oversee initiatives of all sizes. At Quadrant, we’re Information Security professionals first. Our team has held various security roles throughout their careers, ranging from security analyst to CISO and because of this, we have the ability to qualify resources before they get you. We only provide our customers with the best security talent available!


MANAGED SECURITY SERVICES AND TECHNOLOGY During the Managed IDS / IPS installation process, our team of security professionals will set up a machine that acts as an alarm system for your network. This machine (referred to as our Quadrant Sensor) analyzes the traffic coming into the network point of presence for any nefarious data and compromise attempts. Our sensor detects intrusions by first parsing network traffic in order to extract its application-level semantics. It then executes eventoriented analyzers that compare the activity with patterns deemed nefarious. Its analysis includes detection of specific attacks including those defined by signatures, as well as those defined in terms of events, and unusual activities (certain hosts connecting to certain services, or patterns of failed connection attempts). Our Security Operation Center (SOC) handler then assesses each alert to determine the nature and significance of the attack. In the case of a serious event, the system automatically alerts our SOC, 24 hours a day 7 days a week. In the event of a high-risk alert where we determine that the enterprise could be compromised, we will either block the source address of the offending traffic or notify the customer management personnel. Quadrant uses a system that can be tailored 100% to your company’s needs. Its specialized language allows us to select alerts appropriate to your network, as well as add and remove alerts as your policies change and new attacks are discovered. Additionally, we provide you with a web-based interface to see the alerts as well as a list of personnel currently monitoring your network. Through this interface you can also generate reports at any time for your own records. On a quarterly basis, we will provide you with a comprehensive report of all suspicious events including an executive summary of the most significant attacks.

SAGAN Sagan is a multi-threaded, real time Security Event Management and Analyzer application, but with a twist. Sagan uses a Snort-like rule set for detecting malicious traffic on your network and/or enterprise data assets. Upon start-up, our product contains over 2000 internally developed attack signatures that we use to detect and validate malicious activity. Our Sagan console allows for easy configuration and on-going management of your deployment, providing you with peace of mind that your core assets are being watched. Our Sagan console also has the ability to receive feeds from any network or computer device that communicates via sys-log, event log, or SNMP Trap. This capability allows for centralized viewing and correlation of any event originating within the Enterprise or outside the perimeter.


WHY QUADRANT Simply put... We’re a group of Information Security professionals first, not auditors. Quadrant is a dedicated team of security consultants committed to providing high-caliber services for your enterprise. We purposely focus on Information Security program development and related technologies, but have deep expertise in auditing standards and process improvement. We approach every engagement with the same mindset and take pride in ensuring that solid communication, knowledge-transfer, and delivery are a priority for each project.

Contact info: w

quandrantsec.com

o

904 . 253 . 7855

e

info@quadrantsec.com


Quadrant Information Security