WebTech42

Secure Networking

Best security for your Network

Key Areas

WebTech42’s network architecture reviews assess the personnel, processes, and technologies that are currently in place to protect infrastructure assets. The review identifies any gaps in asset protection and measures the results against recommended best practices and what is typically found at other organizations of similar function, size, and target value. Based on the findings of the assessment, WebTech42 will provide tactical and strategic recommendations for those areas in need of improvement.

The review will assess the following key areas:

  • Key security architecture design assumptions: This includes assumptions about the organization’s security posture, the threats it faces, and the controls that are in place to mitigate those threats.
  • Current network topology: This includes the layout of the organization’s network, including the devices and connections that are used to connect different parts of the network.
  • Inventory of existing security technologies: This includes a list of the security technologies that are currently in use, such as firewalls, intrusion detection systems, and antivirus software.
  • Security policies, guidelines, and procedures: This includes the organization’s policies and procedures for managing security, such as password management, incident response, and data classification.
  • Network access controls and network segmentation: This includes the controls that are used to control access to the network and to segment the network into different zones.
  • Business continuity and contingency preparedness: This includes the organization’s plans for ensuring that critical business functions can continue in the event of a disaster.
  • Third party reliance and service level agreements: This includes the organization’s reliance on third-party vendors and the service level agreements that are in place with those vendors.
  • Third party and partner integration and access: This includes the organization’s policies and procedures for granting access to third parties and partners.
  • Gap analysis of missing, incomplete, or improperly implemented security controls: This includes an assessment of the organization’s security controls to identify any gaps or weaknesses.
  • The review will result in a report that includes the findings of the assessment, as well as recommendations for improvement. The report will be tailored to the specific needs of the organization and will be presented in a clear and concise manner.