co-driver

Advisory & Audit

Many customers across different verticals must meet requirements governed by an external auditor or framework.

Advisory & Audit

This could be specific to your industry requirements, or more general informational security standards, such as PCI, HIPAA, & SOX. Others may not be specifically bound by any regulatory bodies but do require best practice IT infrastructure and security to pass due diligence investigations when working with other organisations that are subject to more stringent regulation.

Frameworks change over time, and new frameworks may need to be implemented as business requirements change. We often say that security is a process, not a steady state. With regular reviews you can be well prepared for any framework changes.

Advisory & audit services:

Firewall Health Check & Audit

Firewall Health Check & Audit

We recommend a firewall health check/ audit on an infrequent but regular basis. For some clients in highly secure environments this can be as often as every month, however for the majority of enterprises once or twice per year. This is subject to how often the firewall rules change or changes are made within the organisation.

Business drivers include a major change in the business, a merger, publishing new websites or services, new cloud or on-premise business applications or a change of technical administration staff.

Meeting Compliance

Meeting Compliance

Many of our customers across different verticals must meet requirements governed by an external auditor or framework. This could be specific to your industry requirements, or more general informational security standards, such as PCI, CIS, FCA, DSPT, HIPAA, & SOX. Others may not be specifically bound by any regulatory bodies but do require best practice IT infrastructure and security in order to pass due diligence investigations when working with other organisations that are subject to more stringent regulation.

Penetration testing

Penetration testing

The best way to beat the threat actors is to act like them. This is why penetration testing should be a cornerstone of any enterprise security strategy.

Our penetration testing team can perform a range of simulated attacks to identify any vulnerabilities that a system may have, and as with all ANSecurity security assessments, we’ll provide you with a comprehensive and understandable report.

Cyber essentials & Cyber essentials plus

Cyber essentials & Cyber essentials plus

Through our experience with cyber essentials, we can ensure that the answer to each question is an accurate representation of your environment. We will also work with you to ensure that policies and processes are being applied correctly, and help you to define those polices and processes suitable for your business, if these are not already in place. In our follow up report we will identify projects which can be stood up to remediate any areas that aren’t compliant with the cyber essentials assessment. Each project within the report is linked against the specific questions in the assessment that it remediates and is scored from 1-3 against our risk and complexity matrix. In many cases the remediation can be deployed using technologies you already have (for example with Microsoft Group Policies) – the report will highlight where this is true.


LET’S TALK ABOUT  YOUR CYBER SECURITY