Security Assessment

The purpose of the security assessment is to measure, analyze, and document network functionality and performance. Areas of assessment include:

    • Local Area Network (wired and wireless)
    • Wide Area Network (WAN)
    • TCP/IP, DNS/DHCP, and other network protocols
    • Firewall
    • LoadBalancer
    • Intrusion Prevention System
    • Intrusion Detection System
    • Proxy
    • Authentication


The security assessment team will employ protocol analyzers and performance monitoring tools to gather metrics on Security devices. In addition, configuration and general security health data for all security devices will be collected using the appropriate GUI and/or CLI. The techniques employed include:


    • Physical-layer analysis: Perform an automated network discovery and develop and/or verify network map. Examine data captured by protocol analyzers and identify physical errors related to networking devices.
    • Network design and configuration analysis: Collect device configuration information. Compare design and configuration data against best practices.
    • Network utilization analysis: Examine network utilization for WAN and Internet access connections.
    • Network throughput analysis: Measure actual data transfer rates for WAN and Internet access connections and compare against expected results.
    • End-to-end performance analysis: Measure network latency across the network. Examine data retransmission rates and the route/path of packets through the network.
    • Security vulnerability analysis: High level security assessment to include switch and interface security as well as VLAN security (e.g. guest access versus corp access). Assessment scans and credentialed scans can be included in the assessment pending client approval. Credentialed scans allow access to systems and selected end-user devices to enumerate services, applications, and patch levels.


The information collected during the assessment will be analyzed, compared against best practices, and incorporated into an assessment final report. Approximately 2 to 4 weeks after the on-site visit, the final report will be distributed to the client for review and discussion.


The network assessment will take place over a period of 4-6 weeks, depending of the network size and complexity and will occur in several steps. The steps are defined as follows:


    1. Define the scope of the security assessment
    2. Develop assessment plan
    3. Site Visit (if required)
    4. Retrieve network probes and associated data
    5. Analyze data and develop assessment report
    6. Conduct conference call or on-site meeting to review assessment report


Performance data will be collected by PXOSYS Engineers using network probes installed on the client network. Performance monitoring applications installed on the network probes may include:`


    • Using a SNMP-accessible data for all core network switch and router interfaces including utilization and errors
    • ntop to characterize network traffic
    • Nessus for vulnerability scan
    • Iperf for network throughput/jitter/latency testing


If you are interested contact us, one of our Architects will be able to assist you and go over your requirements.


We see the network as the platform for all your business functions and communications. It should provide a powerful point of differentiation through availability, flexibility, scalability, performance, and security.​

Data Security

Digital transformation and hybrid IT are pushing security perimeters off premises, into the cloud, and into the workplace. We help you create an agile and predictive security posture across your digital assets and the workplace.


Effective teamwork speeds up processes, reduces mistakes and is key to reaching your goals. To transmit and share vital information, your business need reliable tools available any time, from virtually anywhere.


Built for performance and reliability, truly Public or using an an hybrid IT environment will become an IT services broker, accelerating service delivery and transformation.

Brief Description

Contact Us For Collaboration, Questions Or To Say Hi

We love technology, so feel free to challenge us. You have our attention!

London Office

36 Goulden House
SW11 3HG

Email: [email protected]

Phone: 020 7183 2002