ERE Information Security Auditors
Home | Site Map | Contact Us |  Resource Center
This text is replaced by the Flash movie.
list of IT security and compliance audit steps
ERE Differentiators from other vendors

Intrusion Detection and Prevention

Intrusion Detection (IDS) has the ability to monitor network and server traffic in order to identify potential illicit activities such as malicious network traffic and computer usage that can't be detected by a conventional firewall.

This includes network attacks against vulnerable services, data driven attacks on applications, host based attacks such as privilege escalation, unauthorized logins and access to sensitive files, and malware (viruses, Trojan horses, and worms).

ERE provides state of the art host intrusion detection system monitoring service and network intrusion detection system monitoring service.

ERE will assess, design and implement the required monitoring infrastructure appropriate for each client’s specific environment. On an ongoing basis ERE will monitor the output from the sensors, analyze and forward alerts in a timely fashion and provide regular reporting. ERE will also help define an incident response process and provide technical resources to help resolve or recover from major incidents, as determined by each client’s specific requirements and processes.

IDS Top 10 Attacks

Vulnerability Management

  • We buffer our clients from the complexity and labour intensive effort to install and use intrusion detection.
  • We constantly reduce false positives in order to save our clients time and reduce unnecessary network traffic caused by false positives.
  • Maintain IDS software for patches and threat signatures.
  • Provide crystal clear trouble tickets identifying root cause, risk, and remediation suggestions.
  • Provide regular reporting about the security health of the network to both technical staff and management.
  • ERE will help define and implement effective incident response processes.

Simple Painless Implementation

  • ERE works with clients to determine requirements based on risks and current environment.
  • Design the intrusion detection system configuration.
  • Implement using existing hardware and IDS software or assist to evaluate and select the best fit IDS software and hardware.
  • Document intrusion detection system operational activities and procedures.
  • Work with our clients to define alert levels and corresponding response and escalation procedures.

Contact us right up front to save time and expense

The total cost of ownership of IDS may be far less than you expect. ERE’s monitoring service may dramatically reduce current or projected IDS costs. Let us save you time. Contact us for a cost saving quote.

 
 

Contact Us

905 764 3246

 
 
  Budgetary Price Quote
  10 minute scope definition call
  ROI Calculation for your next Audit 
  Sanitized Statement of Work
  Sanitized Audit Report
  Product Literature  
  White Papers and Published Articles
   
  Please see Ron Lepofsky’s book,
The Manager’s Guide to Web Application Security,
published by Apress Media

http://www.apress.com/9781484201497

The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively.

 
Home | Technology Audits | Compliance Audits | Process Audits | Doc Audit/Authorship| | 7x24 Monitoring | Knowledge Transfer
ERE Differentiators | About Us | Site map | Contact Us | |   | Resource Center
Copyrights © 2007-2008. All rights reserved.  

   AddThis Social Bookmark Button