Organizations must consider many threats when it comes to managing and operating their infrastructures. As such, it is important to ensure that proper standards and compliance requirements are met performing various processes. Operations Security is all about ensuring that people, applications, equipment, and the overall environment is properly protected. It involves maintaining and keeping up with implemented security solutions, tracking changes, maintaining systems, continually enforcing standards and following through with best security practices. It also deals with day-to-day operations necessary to ensure that people, applications and servers have the proper access privileges to the specific resources they are entitled to. Ultimately, most operational tasks are also related to monitoring, auditing and reporting controls.

Vulnerability Assessment

A vulnerability assessment is the process of identifying, quantifying, and prioritizing vulnerabilities for a specific environment. This diagnosis helps organizations evaluate their security positioning, through the identification of their weaknesses. At Akson Consulting Inc., our approach consists in:

  • Identifying systems’ vulnerabilities
  • Assessing risk and prioritizing remediation based on the degree of exploitability
  • Confirming system exploitability
  • Reporting results using compliance standards (PCI-DSS, NIST 800-54, etc.)
  • Documenting remediation techniques

Our expertise enables our clients to identify their IT exposures and help them deploy a strategy, in a way to prioritize remedial actions. Our remedial strategy highly values the fact of being holistic first, providing a comprehensive strategy to solve identified security related issues, and accordingly go beyond a simple detection/remedial approach. Our philosophy is to consider identified vulnerabilities as more than a technological or technical issue.

Penetration Testing

A penetration testing is the process of simulating network virtual attacks (internal/external), in order to test and bypass a specific system’s security control. Organizations need to assess security measures’ effectiveness they have implemented, and penetration testing can help them perform that evaluation. At Akson Consulting Inc., we offer four main types of penetration testing services:

  • Web Application Penetration Testing
  • Network Penetration Testing
  • Database Application Penetration Testing
  • Wireless Penetration Testing

Malware Detection and Analysis

The threat landscape for malware has evolved to drastically become advanced, efficient, sophisticated and targeted. Many organizations still rely on detection mechanisms, based on paradigms that are no longer efficient at detecting and containing today’s malware. At Akson Consulting Inc., we help our clients improve their malware detection and analysis posture, by integrating advanced methodologies into their security structures. Our approach involves a set of processes, procedures, technologies and best practices that will qualify our clients deal with the new threat landscape in the best way.

Monitoring (SIEM)

Monitoring is an essential element of security operations for companies. The multiplication of technologies in an organization confronts them to a colossal challenge, since there is no method of normalizing, aggregating and correlating security events across technologies. Moreover, the fact that different teams manage and operate different technologies cripples the efficiency of monitoring, since it becomes difficult to piece together a cyber-attack. SIEM solutions offer the best way of answering those issues. At Akson Consulting Inc., we assist our client by offering the following services in terms of monitoring:

  • Design, Architecture, Deployment and Integration of SIEM platforms
  • Use Case development
  • Integration and Tuning of event sources
  • Optimization of SIEM deployments

Security Operation Centers (SOC) Design and Implementation

SOCs are centralized units ensuring operational security inside an organization. SOCs tasks are mainly monitoring, detection, protection, incident handling, and responding against threats. Building a SOC is a challenging task and needs careful planning prior to its implementation. At Akson Consulting Inc., we offer the following services, in order to support companies design and implement a SOC:

  • SOC Design and Strategy
  • SOC Architecture
  • SOC Implementation