Network Security / Network Penetration Testing
Network Security lifecycle optimization

Coral offers the industry best practices on Network Security Assessment. Listed below is the coverage of the assessment along with the details. Coral consulting support extends to help you optimize in design, implementation, audit and review of existing and planned infrastructure.

  • Network Topology & Security Architecture
  • Network Performance Review
  • Implementation Review
  • Vulnerability assessment
  • Penetration testing
  • Infrastructure Hardening

Network Topology & Security Architecture


Description

The network topology and architecture assessment will identification of design risk involved. Client's current network architecture, services and security setup is reviewed and recommendations are provided for mitigating security risks associated.


Deliverable / Benefits

Mitigation Techniques at Layer 3 Mitigation Techniques at Layer 2 Physical/Logical Separation Securing Management Access Wireless LAN (WLAN) Security

Network Performance Review


Description

The review performed will help in determination of utilization of the specific network. The benefit of this assessment will include disabling unnecessary services, reallocation of network infrastructure to more important network segments, and set direction for additional acquisition.


Deliverable / Benefits

Service that can be disabled;
Devices that can be reallocated;

Budgeting inputs for next IT capital expenditure

Network Implementation Review


Description

Device Level audit - Coral will carry out the device level check for respective devices against the best practices and client's policy.  Our methodology includes questionnaires, interviews/meetings with key process owners, and device observations for performing the activity. Following are the devices which will be covered for the device level audit:

  • Servers
  • Wireless LAN
  • Network Devices (Switches, Routers)
  • Firewalls
  • IDS/IPS
  • Anti-virus Deployment
  • Desktops

Deliverable / Benefits

Customized Hardening recommendations for Servers, Network devices and Desktops.

Vulnerability Assessment


Description

External Network Vulnerability Assessment - evaluation of network security from an external perspective (“from the outside looking in”), focusing on the defensive perimeter of the network and the devices (firewalls, routers, etc.) that provide protection against attacks launched from a remote source.

Internal Network Vulnerability Assessment - evaluation of network security from an internal perspective (“from the inside looking out”), with particular attention to those configuration and implementation weaknesses that could place the network at increased risk from the “insider” threat.
Our methodology includes a number of additional assessment services that can also be added to provide a complete picture of system security.


Deliverable / Benefits

Key deliverable include highlighting vulnerabilities waiting to be exploited. The activities results in detailed information on vulnerabilities which are most critical, which are less significant, and which are false positives. This allows the organization to more intelligently prioritize remediation.

Penetration Testing


Description

The penetration test is designed to evaluate security measures implemented in an IT environment comprising of both the network components and applications.

This test is performed using various tools for discerning network components and application and subsequently evaluating the same for vulnerabilities that may cause an impact.


Deliverable / Benefits

Penetration testing extends vulnerability assessment by demonstrating actual attack, rather than just showing you the weakness.

Provides not only detailed information on actual, exploitable security threats but also the “resulting outcome”.

Infrastructure Hardening


Deliverable / Benefits Hardening is the process of disabling unnecessary services, ports, services, features, access consoles. Hardening applies to almost all infrastructure devices some of which are listed below:
  • Operating System Hardening
  • Network Hardening
  • Application Hardening
  • Email Servers
  • FTP Servers
  • DNS Servers

Description

Implementation of hardening practices on existing infrastructure.

Contact Us:

Please enter your contact information in the fields below
and one of our experienced consultants will contact you immediately.