Network Monitoring and Security
SUM Global has world class network monitoring experts utilizing tools such as Nagios, Service Now and many others.
Complete assessment by imitating a “hacker” with no inside information regarding your systems present or technologies currently in use. We will complete the Penetration Testing Assessment using the following test types:
Internal DNS configuration
Identify subnets and network architecture
Default or weak authentication configurations
Identify running services
Validate authentication requirements for non-public information
Test system patch levels for currency
Identify weak protocols used in the environment
Conduct vulnerability scans of systems and network devices (SSL, Web Servers and Edge Servers)
Conduct vulnerability scans of specifically defined systems
Exploit systems when possible, and notify you if they’re found to be exploitable
Evaluate test results and identify false positives
Submit Proposed Services Draft for customer review and consideration
Submit Final Statement of Work for customer review and acceptance.
Statement of Work will include;
Project Objectives Schedule
Services Checklist (Includes Technical Requirements & Other Details)
Conduct a pre-installation planning session to review:
Statement of Work
Introduce Technical Team (All Participating Organizations)
Discuss preferred communication methods
Conduct a post project session to review:
Audit Report (All Services Performed with Pass/Fail results)
Customer Acceptance and Approval
Internal Penetration Test Requirements:
We will supply hardware and resources to perform the testing remotely.
This hardware will need access via remote session and have access to your network.