According to Cisco, 48% of executives are "very concerned" about security, with 41% much more concerned than they were three years ago. Data theft has now become a multi-billion dollar industry, and anyone with a connection to the internet is a target. At ENS Group, we believe this area of technology is so important that we've dedicated an entire practice area to computer security.

The overwhelming majority of computer security breaches today are the result of non-sophisticated attacks, most of which could be avoided with the deployment of simple or intermediate controls. So how do you know what to protect, and how to go about protecting it? 

ENS Group recommends adhering to a lifecycle approach for any IT security initiative. This lifecycle begins with a Security Posture Assessment and progresses through the development of an organizational security policy, the implementation of security controls, and the ongoing monitoring and testing of these controls. As a Cisco Premier Certified Partner with four Cisco Certified Experts (CCIE) on staff, and a team holding over 400 industry certifications, we understand what computer security means to business, and provide the most comprehensive network security services in Northern Indiana, Northwest Ohio and Southern Michigan.



Get Started Today CLICK HERE!

Don't Waste Time Trying To Find A Solution Build your policy with our Computer security experts

  • Sometimes a second set of eyes (or in our case, a team of eyes) is the best way to get the overall picture, and our Security Posture Assessment is perfect for that. Intended to be a “deep-dive” into the security-related elements of your network, it includes both onsite and remote work, uses both manual and automated methods, and produces a highly valuable set of deliverables. 

    The scope of this assessment includes:

    • Discovery of Network-Connected Nodes: Scans network segments to identify and catalog wired and wireless IPv4 nodes.
    • Information Technology Risk Assessment: Identifies vulnerabilities as they relate to discovered nodes.
    • Security Policy Analysis: Evaluates published policy for completeness and consistency with management’s intentions.
    • Control Configuration Analysis: Evaluates network topology and configurations of network infrastructure nodes (firewalls, routers, switches, etc.) for consistency with security policy and generally accepted best practices.
    • Summary of Findings and Recommendations: Provides a written account of our findings and recommendations from the aforementioned activities.

    This assessment begins with a discovery of your computing assets and uses both manual and automated methods. Once the discovery is complete, we execute a vulnerability assessment, taking into account a variety of risk categories. From there, we conduct interviews with the owners and custodians of these assets and stored data. These interviews are intended to provide us with sufficient information to complete a qualitative risk assessment, which is intended to present an economic balance between the impact of the analyzed threat(s) and the cost of the countermeasure(s).

    Next, we conduct an assessment of the client’s existing security policy. We evaluate it for completeness in the context of protecting the aforementioned assets against the relevant risks.
    After the security policy analysis, we assess the configurations of any deployed security controls (e.g., firewalls, IPS sensors, etc.) to gauge how effectively they are enforcing the restrictions prescribed by the security policy.

    Finally, we provide a written account of our findings and recommendations from the activities in this assessment, and work with you to determine the best course of action for your organization. This gives you a thorough audit of your network security, and create an action plan to address any vulnerabilities. Of course, we are here to help with addressing these concerns if you would prefer to focus on other projects within your organization – it’s up to you!