The purpose of the security assessment is to measure, analyze, and document network functionality and performance. Areas of assessment include:
The security assessment team will employ protocol analyzers and performance monitoring tools to gather metrics on Security devices. In addition, configuration and general security health data for all security devices will be collected using the appropriate GUI and/or CLI. The techniques employed include:
The information collected during the assessment will be analyzed, compared against best practices, and incorporated into an assessment final report. Approximately 2 to 4 weeks after the on-site visit, the final report will be distributed to the client for review and discussion.
The network assessment will take place over a period of 4-6 weeks, depending of the network size and complexity and will occur in several steps. The steps are defined as follows:
Performance data will be collected by PXOSYS Engineers using network probes installed on the client network. Performance monitoring applications installed on the network probes may include:
Contact us for a sample report.
We see the network as the platform for all your business functions and communications. It should provide a powerful point of differentiation through availability, flexibility, scalability, performance, and security.
Digital transformation and hybrid IT are pushing security perimeters off premises, into the cloud, and into the workplace. We help you create an agile and predictive security posture across your digital assets and the workplace.
Effective teamwork speeds up processes, reduces mistakes and is key to reaching your goals. To transmit and share vital information, your business need reliable tools available any time, from virtually anywhere.
Built for performance and reliability, truly Public or using an an hybrid IT environment will become an IT services broker, accelerating service delivery and transformation.