A Nettology Perimeter Cyber Security Assessment provides a quarterly risk management evaluation of the perimeter of your business network security. We focus on PERIMETER ASSESSMENT for businesses who need to prepare for a compliance review. We will pinpoint perimeter vulnerabilities and cyber security risks that threaten the security of your network applications.
Assess your perimeter vulnerability and take actionable steps to prepare your company for a security audit.
Why is a PERIMETER ASSESSMENT of value?
Changing IT landscapes (virtual, mobile, cloud services) and evolving cyber threats have made periodic scanning and compliance audits insufficient to protect businesses against modern cyber attacks.
If an attacker were to gain control of your firewall and router, they could potentially impact the security of your network infrastructure as a whole.
A perimeter network, often called the DMZ (demilitarized zone network) or edge network, links incoming users to the Web servers or other services. The Web servers then link to the internal networks via an internal firewall.
A perimeter firewall exists to serve the requirements of users outside the boundaries of the organization. User types may include:
- Trusted –
Employees of the organization, such as branch office workers, remote users, or users that work from home.
– Business partners of the organization, for whom a higher level of trust exists than with untrusted users.
– For example, users of the organization’s public web site.