Hoplite’s cyber and network experts can help assess network vulnerabilities, and help develop Decision-Support and Situation Analysis Reporting.
External Security Posture Assessments (ESPA)High Level ESPA’s are a simple way to get a report of your network and domain’s current “Health”. We examine 16 key external risk areas to create this report they are: - Domain / IP Reputation - Malware – Email - Malware – Domain - Adversary Recon - Adversary Targeting - Adversary Communications (Mentions) - IT Asset Footprint (Attack Surface) - Organizational / Employee Social Media Attack Surface - Exposed Intellectual Property / Source Code - Compromised Accounts - 1st Party - Compromised Accounts - 3rd Party - Exposed Employee / Customer PII / PHI - Exposed Credit / Debit / Bank Information - External Infrastructure / Application Vulnerabilities - Network Compromise - Other Adversary Activity Contact a Hoplite Sales Representative to request an assessment. Hoplite will run the report, set up a meeting time to go over the results, and propose a solution package that best fits your needs. External Security ScansRegular external security scans are vital to your IT and risk management team. They provide visibility from the adversary’s view point looking for holes in your armor that could be exploited. Be aware of these issues and address them before the adversary’s find them. Hoplite can perform an external security scan and give you a report of your vulnerabilities. This is vital because of ever changing hardware and software updates, changes and patches. Policy Review and ImplementationHoplite can review your current IT policies and help you create solid set of cyber/IT policies. Having solid policies in place is the 1st step in creating a strong security culture with in your organization. Hoplite has a collection of standard policy templates and best practices that they can customize for your organization. Cyber Forensic Lab ServicesHoplites Team has over 15 years of Cyber Forensic Experience. They have worked over 100 cases with Law Enforcement and Private Litigation firms. If you find yourself in need of a qualified Cyber Forensic Expert, Let the Hoplite Team put their expertise to work for you. |
Internal Security Posture Assessments (ISPA)The Internal Security Posture Assessment (ISPA) process leverages Hoplite’s patented Active Network Defense (AND) platform to provide up-to-the-minute threat intelligence and multi-layer threat detection. This assessment identifies specific internal and external threats and provides related remediation and policy recommendations. Assessment scoring is based upon observed traffic in twelve (12) key areas, indicative of the state of Information Security at your organization. The (12) key areas are:
- DoS – Target - DDoS – Target - DDoS – Source - Malware (C2) - Malware (Distribution) - Malvertising - Tor / I2P / Proxy - Malicious SSL - Scanning - Bruteforcing - Spamming – Source - Phishing - Target Vulnerability ScanningHoplite understands that security assessments are an important part of our customers' application development and deployment. Therefore, we have established a product for customers to request penetration tests carried out by Hoplite and trusted third-party vendors. These reports require written justification signed by customer executive(s), are strictly governed by Non-Disclosure Agreement guidelines and cannot be shared in any form. Such penetration test reports can be purchased by contacting a Hoplite Sales representative. Customized Vulnerability NotificationsProvide Hoplite with a list of your organizations current hardware and software. From this information, Hoplite will build you a custom weekly notification. The notification will alert you of updates and patches that are available to address know vulnerabilities for the hardware and software that you are using. Baseline Security AssessmentsBeing secure in today’s world requires not only a firewall and a password. It requires a total view of your originations vulnerabilities starting with culture, policy, physical environment. Other companies just provide IT based assessments, Hoplite believes security begins with people, not just technology. How do you start to defend or address your total security without a good idea of where you stand today? Let the Hoplite Team come on site to your organization and review your current security situation from a Hoplite Security view point. With our Baseline Security Assessment, Hoplite will outline where policy and process should be adjusted to increase your total security posture. |