Proprietary Scanning Appliance for Vulnerability Assessments and Network Scans

CYFOR Secure’s ‘Pulse’ Vulnerability Scanning Appliance incorporates a proprietary software stack within a small, portable storage device. This delivers comprehensive network scanning, vulnerability assessments and covert security assessments. Typically, these technical assessments would require onsite attendance from a technical expert to connect, navigate and analyse the retrieved data. With the Pulse Scanning Appliance, CYFOR Secure can connect to networks remotely and perform a variety of network scans, varying in focus and depth.

Vulnerability Scanning Assessments

Assessments for PCI-DSS

This is a one-off assessment that prepares your company for PCI-DSS Compliance. The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that ALL companies that accept, process, store or transmit credit card information maintain a secure environment. Our compliance assessment allows you to run a scan on your network to determine what work is required for you to meet the standard prior to running a full compliance scan. We can walk you through the process from initial request through to full compliance.

There are many people that will offer advice on what answers are required to pass the self-assessment questionnaire, but this can put your insurance at risk if you do suffer a data breach and the conditions have not been met. It also helps avoid the £35 per month charge that can be applied to your card processing account for non-compliance.
• Helps you achieve compliance standard
• A simple automated process that is controlled from our head office.
• Complete a pre-scan questionnaire and leave the rest to us.
• Post initial report meeting to discuss the findings and plan remediation works.
• Final scan to confirm the compliance standard. All final reports can be submitted to your bank as proof of compliance.
• Helps avoid unnecessary charges
• Can be run ad hoc when required (Annually with Quarterly External Scans) or continuously to alert you when you have fallen out of compliance.

Network Assessment

Our network assessment allows data to be extracted easily from your server or from each desktop. We can also create an inventory of all your computer hardware, network hardware and configurations. This makes reviewing system upgrades and identifying system bottlenecks an easy process by presenting the data in our easy-to-use web portal or via our generated reports.

SQL Assessments

Do you have multiple SQL servers which you need to manage? We can take the pain out of SQL Management by extracting all the SQL configurations and presenting them in an easy-to-read format. This helps you see which accounts have elevated permissions and identify configuration issues faster as all servers are included in the single report. If you utilise CYFOR’s Managed IT Support service, we can look after the monitoring of your SQL databases and extract the data as required. It can take an IT administrator many hours to extract the required information for department heads to review. This service allows reports to be printed on request and all the data can be reviewed directly from our web portal, saving many hours of work.

Security Assessments

Our security assessment runs a Dark Web scan on your company’s domain and checks your router externally for exploitable security holes. All collected data is reviewed from the other scans to generate security warnings, such as no Anti-Virus installed, and Account lockout disabled. Our report generation process allows easy to read reports to be generated, detailing all identified security concerns so they can be reviewed as often as required. All you need to do is request a new scan to take place and we will provide you with the PULSE Vulnerability Scanning Appliance and the portal data will be updated. Normally this data is hard to extract or is not even looked for, we make this process as seamless as possible with minimal client input. If you want us to manage your security, then our Managed IT Support service is perfect for you as we will generate and review this report on a monthly basis.

Assessments for Microsoft Platforms (Office 365 & Exchange)

Do you use Office 365? Gaining statistics through Microsoft 365 can be a complicated process if you are unsure of what you need to do. Our Exchange assessment tool can extract the data from Microsoft 365, Exchange 2013, 2010, 2007 and 2003. We can generate easy to read reports detailing mailbox usage, traffic and usage reports, mobile device connectivity, distribution lists, mailbox permissions and more. These reports make it easier for the technical details to be reviewed without worrying about accidentally changing an important setting. This is also the perfect tool to use while migrating services from an old exchange server to Microsoft 365, our reporting tools allow permissions and mailbox details to be reviewed and checked in a simple report format.

ISO 27001 Compliance

This can help you improve your systems and policies to achieve ISO 27001 level of compliance before starting the official compliance process, saving time and money. Once you have achieved ISO 27001 or if you’re already certified PULSE makes sure you maintain the required standards and makes the annual review easier as the compliance reports can be generated and presented to the assessor.

Cyber Insurance Compliance

Cyber Insurance is gaining in popularity and helps safeguard your business against the costs of investigations and remediation work in the event of a malware attack or data breach. Each cyber insurance policy has its own requirements and meeting these requirements is essential to a successful claim. The Pulse Scanning Appliance can monitor your network and advise you on issues that fall outside of your Cyber Insurance policy, this makes sure you are in the best position to receive 100% of your pay-out if a breach was to occur.

GDPR Compliance

Let us guide you through the GDPR Compliance process to make sure the required policies are in place and up to date and your computer systems comply with the regulations. Once you have achieved the required levels the appliance continues to scan your network daily and alerts you when you fall outside of the compliance guidelines. The scans include detecting PII on individual systems so you can make sure it is stored securely.

How does the process work?

  • The Pulse Scanning Appliance is simply connected to your network via a router, firewall or network switch. It then notifies our experts to initiate the required scan procedure.
  • All that’s required is an active internet connection and a mains power connection. Once connected to your network, it can run daily network security scans and weekly internal and external vulnerability scans with enhanced malware detection.
  • This service requires a dedicated on-premise appliance that stays connected to the target network, allowing scans to be conducted daily, generating a complete security profile and identifying security changes over time.
  • Our internal threat monitoring system collates all data from the completed scans and applies a series of policies to create alerts that can indicate potential security risks, malware, new vulnerabilities, and user configuration issues.

Buy a Vulnerability Scan and help us secure your business

Click here to buy a Vulnerability Scan