A well-designed security policy and sound network monitoring strategies are the most important ways you can protect against unwanted Internet intrusions. But no technology or plan is absolutely foolproof. That’s why it’s equally important to know that ITCS offers network intrusion detection for immediate detection of unauthorized access to your systems.
The greatest threat to your business today is internal hacking. Internal, from your own employees: the people who know your business inside and out. The days of being able to have your e-mail servers, domain controllers and ERP servers on the same subnet with no access controls between workstations and servers is over. However, internal security is often given a lower priority and put on the back burner while the perimeter is being fortified.
Our initial assessment includes identification and evaluation of risks and risk impacts, and recommendation of risk-reducing measures. In assessing risks for an IT system, the first step we take is to define the scope of the effort. In this step, the boundaries of the IT system are identified, along with the resources and the information that constitute the system. Characterizing an IT system establishes the scope of the risk assessment. Identifying risk for an IT system requires an understanding of the system’s processing environment. As a network security consulting firm, our first step is to collect system-related information, which is usually classified as follows:
- Interfaces (e.g., internal and external connectivity)
- Data and information
- Persons who support and use the IT system
- System mission (e.g., the processes performed by the IT system)
- System and data criticality (e.g., the system’s value or importance to the court)
- System and data sensitivity.
When network intrusion detection identifies suspicious activity, it immediately alerts ITCS security experts who analyze the information and, if necessary, notify you while initiating a response. With network intrusion detection, you can know about potential intrusions as they are happening, instead of finding out about them after the damage to your systems or security has already occurred.
Network intrusion detection centrally monitors network security in real time, allowing ITCS to detect and respond to unwanted network intrusions while they are happening. The intrusion detection and monitoring services may be provided using customer-owned hardware or hardware provided by ITCS to:
- Provide the extra margin of safety needed for those who conduct transactions or place sensitive information on the Internet
- Alert the location to denial-of-service attacks
- Provide immediate response to events for controlled reaction