ERE Information Security Auditors
Home | Site Map | Contact Us | Cyber Security News | Resource Center
list of IT security and compliance audit steps
ERE Differentiators from other vendors

Network Security Architecture Audit

During the course of normal network security operations, operation staff move technology and deploy new devices in a manner which sometimes inadvertently violates compliance with computer and Internet security policy. 

Configuration changes which are meant to be temporary sometimes are forgotten and become part of the permanent infrastructure. A second pair of eyes to review the configuration of a dynamic network is always beneficial.

The goals of the ERE network security architecture audit are to identify:

  • security risks relating to the placement and validity of all major network components.
  • where the current architecture may not remain secure after the deployment of a plan to change the network. (deploy servers, network devices, communications links, dual NIC cards).
  • discrepancies between the existing network diagram and ERE’s physical observations of the network made during a walk-around investigation.


Contact Us

905 764 3246

  Budgetary Price Quote
  10 minute scope definition call
  ROI Calculation for your next Audit 
  Sanitized Statement of Work
  Sanitized Audit Report
  Product Literature  
  White Papers and Published Articles
  Please see Ron Lepofsky’s book,
The Manager’s Guide to Web Application Security,
published by Apress Media

The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively.

Home | Technology Audits | Compliance Audits | Process Audits | Doc Audit/Authorship| | 7x24 Monitoring | Knowledge Transfer
ERE Differentiators | About Us | Site map | Contact Us | |   | Resource Center
Copyrights © 2007-2008. All rights reserved.  

   AddThis Social Bookmark Button