Why Denver Technology?
We bring our Enterprise and industrial experience into our security assurance services. Our wide range of infrastructure and business analysis skills result in a complete approach to security, focused on addressing an organisation’s security issues from a business risk management perspective.
Denver Technology provides a range of packaged and ad hoc security assurance services, to suit companies of all sizes and most budgets and networks.
The Denver Technology security assurance testing services are characterised by a number of key differentiators including:
- Combination of manual and automated testing: Modern applications are complex. Automated scanning is simply not capable of enumerating all application vulnerabilities. Manual testing and validation provides a way to discover and validate logic-based vulnerabilities which automated scanners often miss.
- Attention to each client’s individual needs: All clients are different. Denver Technology ensures that their security testing services are fully customisable in order to ensure the client’s specific, individual business needs are met.
- Primary focus on business risk not technical risk: Many security testing organisations focus solely on the technical risk to the client. Denver Technology understands that a security risk is a business risk. Therefore, we maintain a strong focus on utilising security testing to identify and remediate business, as well as, technical risks.
- Subscription based services: Experience has shown us that clients want the capability to receive security testing services on a regular, on-going basis. Denver Technology provides subscription-based testing services, allowing clients to purchase a block of tests to be delivered on-demand as per the clients’ requirements.
Denver Technology can provide customized assistance in the assessment of business risks, key business requirements for security and the development of security policies and processes, including security architecture assessments and design (include technology, business risks, technical risks and procedures) and On-site mitigation support after an intrusion has occurred, including emergency incident response and forensic analysis.
Our managed firewall service covers patching, upgrading, and managing firewalls. Management includes monitoring, maintaining the firewall’s traffic routing rules, and generating regular traffic and management reports to the customer. In addition we can assists with Virtual Private Network (VPN), intrusion detection, keeping up to date with new defences against intrusion, and regularly reporting on intrusion attempts and activity. Content filtering services may be provided by; such as, email filtering) and other data traffic filtering.
This is the day-to-day monitoring and interpretation of important system events throughout the network—including unauthorized behavior, malicious hacks, denial of service (DoS), anomalies, and trend analysis. It is the first step in an incident response process.
This includes monitoring event logs not for intrusions, but change management. This service will identify changes to a system that violate a formal security policy for example, if a rogue administrator grants himself or herself too much access to a system. In short, it measures compliance to a technical risk model.