© 2018, drie. All Rights Reserved.
Duration: 10 to 15 days for set-up, 3 to 10 days a month ongoing
Our consultants will deploy advanced monitoring sensors on your network to check for malicious activity. We will build a bird’s eye view of what is happening on your network, what is the normal activity and monitor for any out of the ordinary occurrences.
This is an ongoing service, providing 24/7 coverage for any security incidents that occur. If an incident is detected, we will immediately warn you and create a plan for catching and containing the threat to your network.
– Incident Response
Duration: depending on incident, between 10 to 30 days
This service is of utmost importance if your company has been hacked. We will analyse all the available data to understand how the intruder got in, what data was leaked and what did the intruder do. We will write a detailed report on how to prevent incidents should as these from happening again, and help you secure your company from the intruder – remove them and ensure they do not get it again.
– Vulnerability scan and external asset discovery
Duration: 3 to 10 days (depending on the number of hosts to scan)
A series of comprehensive automated scans that serve a dual purpose: to discovery the external assets of the company, and to perform a vulnerability scan of them. This is effectively a perimeter / firewall security overview, allowing the company to have a broad view of which hosts are exposed to the Internet and what is the risk and threat level of having those hosts exposed.
– Application Penetration Test (white box and black box)
Duration: 5 to 20 days (depending on the number and size of applications to test)
Experienced consultant (ethical) hackers will perform a thorough security review and penetration test of one or more critical applications. The consultants will use advanced hacking techniques manually and with industry standard tools to attempt to subvert the security of these applications.
This kind of test is usually performed on the critical company assets, for example an externally facing web application used by clients and suppliers, or an internal business application which is essential for day to day work. The final report will detail each vulnerability that was found, what is its risk, and how it can be mitigated or resolved.
– Network Penetration Test
Duration: 6 to 20 days (depending on the size of the network)
Employing similar techniques to the Application Penetration Test, our experienced consultants will probe, scan and exploit the target network or networks for security vulnerabilities, and deliver a report detailing what was found and how to fix it. This test is useful for companies that want to test a specific part of the network, such as for example an affiliate or branch network, or even to test their entire network.
– Red Team Penetration Test
Duration: 7 to 15 days (depending on the size of the network)
Our most advanced offering – two or more of our consultants will be “dropped” in a target network, having Administrator level access to a specific machine inside the network. From then on, they will attempt to hack the highest number possible of desktops, servers and applications, and attempt to get Domain Administrator level on the network, while attempting to bypass existing protections like a real hacker would.
This type of test is extremely useful to understand how resilient a company is to an intruder which is already inside the network – the ultimate test in resilience and cyber security.
The Penetration Tests are done live in production networks. Our consultants are very experienced and will ensure that no business disrupting damage will be done. However, there is a small risk involved in any kind of testing, so the scope and breadth of each test will be discussed in detail beforehand.
drie at Gitex
drie at Mepec
What is cloud
What is cloud computing
what are cloud services
Cloud services in Bahrain
Cloud services in the GCC