Technology Assessments | Kudelski Security

Technology Assessments

Our technology assessments comprise vulnerability and security assessments and F5/audit assessments. The vulnerability and security assessments will help identify the technology in your organization that is vulnerable to attack, and will help us devise a solution to minimize the risks. 

  • Network security
    • Next-generation firewalls (App-ID, IPS, AV, Spyware, URL filtering)
    • Network access control
    • Network segmentation
    • APT protection
  • Endpoint security
  • Two-factor authentication
  • Endpoint protection
  • APT protection
  • Data loss protection
  • Security information and event management (SIEM)
  • APT protection
  • Web application firewall (WAF)
  • APT protection
  • Data security
  • Application security

The point-in-time F5 audits/assessments reveal inconsistencies and issues outside of standard best practices. The audits cover

·        Inventories

·        Architecture mapping

·        Topography (current and proposed)

·        Utilization analysis

Clients can choose either the Standard F5 audit service or the Premium F5 audit service, depending on the level of analysis they require.

We maintain hundreds of certifications to support these abilities, and, in many cases, our teams are recommended by the hardware vendors themselves.