Not sure where you stand with regards to your risk or security? No problem, i2S can help. We provide a number of different assessment services, including:
- Security Assessment - Security assessments can vary in the depth and breadth of the assessment. Whether you want to assess specific areas of security, or gain an overview of your whole environmment, i2S can help. Our assessments are tailored to your specific needs and budget. At the end, we produce a detailed report on the findings with suggested remediation steps, all in a language you can understand.
- Business Impact Assessment - A Business Impact Assessment ( BIA), determines the impact, often in financial terms, due to the loss of Confidentiality, Integrity or Availability of a business application, process or data, over a period of time. The output of a BIA helps to determine the security controls required and is input to your Business Continuity and Disaster Recovery (BCDR) plan. It also helps to prioritise where to concentrate your security efforts.
- Risk Assessment - Where a BIA determines the impact to the business, a risk assessment defines the specific risks and threats that could lead to that impact being realised. Risks are measured as a product of threat, vulnerabilty and asset value.
- Vulnerability Assessment - A vulnerability assessment will scan your IP networks, systems, applications and devices for the purpose of identifying vulnerabilities. This could be in the form of out-dated software, open ports and services, default passwords or poorly coded applications. i2S can provide vulnerability assessments services with detailed report containing prioritised findings. As new threats are being identified on a constant basis, i2S recommends that vulnerability management be conducted as an ongoing process, not a one off task. If you are looking for advice on setting up a vulnerability management process or tools, then we can help.