ERE Information Security Auditors
Home | Site Map | Contact Us |  Resource Center
list of IT security and compliance audit steps
ERE Differentiators from other vendors

Remote Access Technology Audit

Methods of remote access to the enterprise network are often overlooked as sources of security risks and threats.  All too often legacy technology such as modems and outdated access privileges granted to vendors for remote support are forgotten, thereby becoming sources of security vulnerabilities.

A list of remote access vectors that ERE often finds on a client site are:

  • Vendor and third party consultant access privileges for remote support.
  • Terminal Access Servers.
  • Virtual Private Networks (VPN).
  • Remote dial-up.
  • Modem Pools.
  • Voice over IP (VOIP).

A client will often request an audit of their remote access technology that is currently in use.  However, ERE has often uncovered forgotten and theoretically not used access technology and access privileges. 

We recommend a network device discovery audit as fundamental to the remote access audit. The remote access technology audit consists of components of the following audits:


Contact Us

905 764 3246

  Budgetary Price Quote
  10 minute scope definition call
  ROI Calculation for your next Audit 
  Sanitized Statement of Work
  Sanitized Audit Report
  Product Literature  
  White Papers and Published Articles
  Please see Ron Lepofsky’s book,
The Manager’s Guide to Web Application Security,
published by Apress Media

The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively.

Home | Technology Audits | Compliance Audits | Process Audits | Doc Audit/Authorship| | 7x24 Monitoring | Knowledge Transfer
ERE Differentiators | About Us | Site map | Contact Us | |   | Resource Center
Copyrights © 2007-2008. All rights reserved.  

   AddThis Social Bookmark Button