network capability profile
DESCRIPTION
Provides a snapshot of your current network with recommendations to improve its overall effectiveness and reliability.TRANSCRIPT
Network Capability Profile
A Comprehensive Audit of Your Business Networks
What is aNetwork Capability Profile?
A pds2k.com Network Capability Profile provides a snapshot of your current network with recommendations to improve its overall effectiveness and reliability
The First Steps On-site review of your network by a pds2k.com
technician
Meeting with you and your IT staff to review initial findings
Develop a written summary of findings, with recommendations to improve your network
Meeting with you and your IT staff to review the summary report and recommendations
The Elements Reviewed in a
Network Capability Profile Data Access Firewalls Internet Virtual Private Networks (VPN) Network Routers Access and Authentication LAN Security Backup and Contingency Disaster Recovery
Section 1: Data Access Reviews user access and/or restrictions
to data files and programs;
Encryption policy and procedures;
Authentication; and
Data archiving policies
Section 2: Firewalls
Assessment of vulnerability to both inside and outside threats
Reviews firewall set up, monitoring, maintenance, updating and repair
Provides recommendations to maintain optimal security
Section 3: Internet Reviews User access and restrictions,
Internet Acceptable Use Policy (IAUP); and use of Proxy Services;
Monitoring policies for User access;
Provides recommendations to protect the network from intrusion, information disclosure, viruses, spyware, etc.
Section 4: Virtual Private Networks (VPN)
Reviews current VPN requirements, policy and procedures for Users
Reviews logging practices used to prevent network compromise
Provides recommendations to maintain fast, reliable, secure communications at all times
Section 5: Network Routers Reviews physical security of Network
routers
Reviews password management, interactive access controls, management services and logging practices
Provides recommendations to prevent catastrophic failure of your network
Section 6: Access & Authentication
Reviews data access of guest accounts and/or temporary accounts
Reviews configurations in place to protect network accounts from intrusion
Provides steps necessary to prevent abuse or intrusion of your networks
Section 7: LAN Security
Reviews your organization’s LAN security and policies
Defines our proven method to Harden/Secure, Prepare, Detect and Respond to LAN security issues before they become a problem
Section 8: Backup & Contingency
Reviews your backup systems, capacity and strategies
Reviews your protection mechanisms for backup and verification
Provides recommendations to develop a business continuity plan
Section 9: Disaster Recovery An assessment of your vulnerabilities
to both natural and man-made disasters
Determines whether your Disaster plan can effectively meet your company’s projected needs
Provides recommendations to update and test your Disaster plan
The Final Steps Meeting with you and your IT staff to
review the NCP report and our recommendations
Prioritize actions to provide an efficient, reliable and secure business network
Determine the amount of assistance required from our technical team to make it happen
About
Progressive Data Systems, Inc. was incorporated in 1990 by Bill Correll. For the next five years, pds2k.com continued to expand and serviced almost 600 clients.
Between 1998 and 2001, the company changed focus to become an Internet service provider, and concentrated on providing computer networking consulting and service to medium-sized business, town offices, and social service agencies.
Since 2003, pds2k.com has concentrated on finding ways to bring more value to their network clients by continuing to develop expertise in all areas of Internet and network security consulting.