Endpoint Analysis

Penetration Test
Vulnerability Assessment
Risk Analysis
Malware Assessment

Summary

No two networks are alike. Organizations need solutions that can be flexible enough to fit their specific business and risk requirements.We help you understand what’s really happening on the network with appliance and end point analysis.

Product description

We Are Torus Technologies

Experience.

Security is our business. We strive to build long-term collaborative customer relationships to develop and deliver a proactive security strategy as your security needs evolve and change. Our team members are your security partners and trusted advisors.

Difference.

The leadership team at Torus Technologies has more than 30 years combined experience working with medium and large healthcare facilities, energy and utility companies, manufacturing companies, retail corporations, state and local government and education entities, financial institutions, and other industries in the commercial field.

Approach.

No two networks are alike. Organizations need solutions that can be flexible enough to fit their specific business and risk requirements.We help you understand what’s really happening on the network with appliance and end point analysis.

Our Services

The cyber threats facing enterprises today are sophisticated, wide ranging, and highly targeted.

Data Breach Risk Intelligence Analysis

Due to the frequency of data breaches, CEOs and board members are now asking tough questions about the organization’s exposure risk. The Data Breach Risk Intelligence Analysis is designed to rapidly discover unprotected data and security vulnerabilities on your servers, workstations, and mobile devices. The Analysis identifies the liability by host and by data set, such as credit card brand, PHI, PII, and intellectual property. Powerful analytics and reports allow IT personnel to effectively quantify and communicate an organization’s data breach liability exposure and financially prioritize data breach risk to focus remediation resources.

Advanced Malware Security Assessment

Provide an in-depth view of the cyber attack life cycle. These attacks outpace the protection of endpoint anti-virus, IDS/IPS, and legacy firewall solutions. Today’s cyber criminals are using a wide variety of attack vectors to infect and gain control of systems on the network, most of the time without your knowledge.

Advanced Malware activity today is best described as a campaign, a series of attacks over time. Using industry-leading Advanced Malware Analysis tools, we will be able to identify Advanced Malware currently residing on the network and generate comprehensive reports at the completion of the assessment that includes Alert Details, Callback Server Reports, Infected Host Trend, and Executive Summary. During the assessment, real-time forensic data and packet level PCAPs can be used to help in any remediation of infected systems.

Social Engineering Security Assessment

Designed to allow organizations a better understanding of the risks they face from attacks directed at their employees. We offer both a Remote and an On-Site Social Engineering Assessment. Performing this scope on a regular basis will also help address regulatory requirements. The specific attacks selected for an engagement are based upon the needs and requirements of each client.

We test end users to determine their awareness of security risks and security training needs using the following tactics:

  • Data Breach Risk

  • Advanced Malware

  • Social Engineering

  • Vulnerability Assessment

  • Penetration Test

Comprehensive reports are provided at the completion of the assessment that will provide management with an understanding of the level of risk introduced by end users. A prioritized list of recommendations will allow for targeted mitigation.

Vulnerability Assessment

Look into the security flaws present on the network. The purpose of the assessment is to identify vulnerability points in a wide range of systems, including endpoints, servers, and network devices such as switches and firewalls, that would allow an attacker to gain access inside the organization. Our methodologies incorporate various tools, delivering actionable and informative results through comprehensive reports that detail severity levels, vulnerabilities by class, impact on business, and resolution. Trend analysis is also available for recurring assessments.

Penetration Test

Simulate a real-world attack scenario. We perform the test externally using multiple methods with the goal of finding at least one vulnerability that would allow us to gain access to the organization’s network. This includes tests ranging from attempted exploits of service-level vulnerabilities to specifically targeting the organization’s endpoints with various forms of client-side attacks. Comprehensive reports are provided at the completion of the assessment that include severity levels, vulnerabilities by class, impact on business, and resolution. Trend analysis is also available for recurring assessments.

Product links

Help the seller understand how this product meets your needs
Contact name
Info
E-mail
info@torusinc.com
Phone
319.248.5502
Location
Coralville, IA, USA
Company
Torus Technologies, Inc
Published