Risk Management

Identify and remediate security and continuity issues across your enterprise

Nexum Risk Management

Evaluate Your Organization’s Security Posture

Nexum’s risk management services help you identify, evaluate, rate, and remediate security and continuity vulnerbilities.

Vulnerability Assessment

A vulnerability assessment is the detailed examination of IT system and infrastructure configurations to determine their security posture, find and document vulnerabilities, and produce recommendations to enhance security.

  • Perimeter: We assess border systems such as firewalls, external security systems, routers, switches and hosts on the internet-facing portions of the client’s network, in interorganizational DMZs and partner-facing networks. The assessment examines the configurations of the target systems and services visible from outside the organization. It may also include hosts available through dial-up (modem) access.
  • Internal: We evaluate internal servers, network infrastructure, security systems and standard client host builds. The assessment may also evaluate systems in DMZs from an internal perspective.

Penetration testing

Penetration testing is the simulation of an attacker’s activities to test/validate the security of your IT systems. Ideally, a penetration test includes systems or networks thought to be reasonably secure. A penetration test may be limited to specific network areas or allow the tester full network access to most accurately simulate an attacker. A good penetration test makes no significant, irreversible changes, even to systems compromised as part of the test. However, any penetration test could cause a system to fail unexpectedly.

  • Perimeter: A perimeter penetration test probes the security of your network perimeter and externally accessible devices and attempts to gain access to corporate assets from outside the organization. This type of test typically includes Internet-based attackers. It may also include dial-up (modem) access, telephone calls to company personnel (social engineering), dumpster diving for important information and even physical security checks (access to corporate facilities). Because many of these systems are sensitive, we carefully scope all perimeter penetration tests with you first.
  • Internal: An internal penetration test tries to simulate an insider’s ability to gain unauthorized access to your systems. This type of test discovers and attempts to circumvent the security controls of internal servers and systems, attempts to gain escalated access privileges on these systems and access to other user data. An internal penetration test allows you to estimate and mitigate the damage that may have been done by disgruntled insiders or those who can gain access to the internal network.

Web-Based Application Testing

Web-based application testing seeks to locate and document system and application-level vulnerabilities in web-based applications, including unauthorized data access and privilege escalation issues. This not only ensures application quality, but also that your applications meet regulatory compliance obligations (e.g., PCI-DSS). Usually internet-based, these tests look for a range of issues, including SQL tampering, cross-site scripting/tracing issues, and other input manipulation and data normalization issues. They are conducted by our experts by hand, using transaction-intercepting proxies and input enumerators, because automated tools currently tend to find only low-hanging-fruit issues and produce too many false positives. Our tests include both black box and code-assisted application security testing.

Configuration Review

It’s important to ensure that your critical network infrastructure devices have proper maintenance and are in good working order. Nexum can perform a multi-point, holistic health check of the devices on your network. We look at preventive maintenance items such as software versions, and perform a deeper look into the configuration to ensure that your systems are deployed in accordance with today’s best practices. Typical inspection points include:

  • Operating system, including hotfix level and consistency across devices
  • Overall deployment architecture
  • Device management and security best practices
  • Availability, redundancy and monitoring
  • Performance including CPU usage, memory consumption and throughput

Nexum is uniquely positioned to perform configuration reviews of critical infrastructure devices on your network. Our engineers are experienced in deploying and maintaining critical infrastructure in large enterprise environments. They draw from this experience to review configurations against manufacturer and industry best practices and apply it to your specific environment to ensure optimal configurations. Nexum also takes a holistic view of device configurations and overall roles within the network. Knowing each device’s role allows us to make recommendations to ensure that the device is the right fit for your environment, and  configured with the right options to ultimately meet your current and future needs. Services include:

  • Hardware and software configurations
  • Software versions in accordance with known stable releases
  • Hardware and configuration scalability
  • Optimal use of available features and options
  • Management, backup, logging and monitoring of the device
  • Hardware redundancy and failover capabilities
  • Overall device performance review
Looking for more information about our assessments?
Contact Us