HomeAboutServicesPentestLabsCase StudyCareersContact
Talk To An Expert
 

A Shipping Company in Europe

Overview:

The organization has been Iceland's largest transportation company. It operates 50 vessels, 2,000 trucks and trailers and approximately 180 cold stores. It has an extensive branch network, with a total of 200 operational bases in 30 countries, employing approximately 14,500 people. Annual turnover exceeds EUR 1.450 billion

Business Needs:

The consulting engagement awarded to Cyber Security Practice to assess security posture of the organization's central. hosting environment Infrastructure, monitor their internal network traffic and analyze the network and security, devices configuration of central hosting zone, service provider managed network devices and some of their another branch networks.

Problems and Challenges:

Bottom Security approach, where in the assessment would be done without access to the information. Engagement execution from the offshore location. The test setup at Iceland, whereas testing at offshore location, Monitoring of the traffic at central hosting environment, required coordination of IT infrastructure, vendors supporting infrastructure management. Security configuration review, security testing and monitoring elements planned to execute in 3 weeks of the Project

Solution:

The engagement plan was outlined into four phases:

  • Configuration analysis of networking and security devices at secure zone or central hosting environment.
  • Assessment and Infrastructure configuration review, Monitoring of the traffic at secure zone.
  • Evaluation of the security posture of the firewall at location where large network behind like Atlas.
  • Vulnerability Assessment of the central hosting environment.

Benefits:

  • Identification and analysing vulnerabilities in network/security devices at central hosting zone.
  • The traffic monitoring snapshots to know about their traffic pattern and help to restrict unwanted traffic from their network.
  • The analysis of network /security devices configuration to know about the stop or restrict unwanted services running on these devices.
  • The analysis of network /security devices configuration to track the unnecessary access “any any” to the central hosting zone

Project Scope:

Network security assessment of central hosting environment


Project Duration:

3 Weeks

SH

Our Managed Services

We've been keeping things safe since 2013

Vulnerability Management Services

Vulnerability Management Services

Penetration Testing Services

Penetration Testing Services

Incident Response Services

Incident Response Services

Virtual Chief Information Security Officer (vCISO) Services

Virtual Chief Information Security Officer (vCISO) Services

ICS Security

ICS Security

Cloud Security

Cloud Security

Breach Attack and Simulation

Breach Attack and Simulation

IAM

IAM

Managed Security Services

Managed Security Services

Technology Assessment Services

Technology Assessment Services

Technology Implementation Services

Technology Implementation Services

Process Advisory Services

Process Advisory Services

Compliance Services

Auriseg's professional services are proven to make your life easier and
your business more efficient

Information Security Management System

PCI Compliance

Cybersecurity Assessment

GDPR Compliance

HIPAA Compliance

Compliance Services

HAVE A QUERY?
Contact Auriseg

If you'd like to speak to an Auriseg expert or inquire about our services.

We are excited to offer the best and the most optimum security services for your business.

We're ready to discuss your next security initiative.

Fields marked with (*) are mandatory

Certifications

Compliance Services

Ready to discuss your
Next Security Initiative?

© 2024 - Auriseg Consulting Limited.
All Rights Reserved.
Chennai | New York | Singapore | Accra | Dubai