Reducing the Risk of Successful Attack

                             Lionel Medina
                          Medina Networks
                          866-865-5307 x 3
Agenda
 Why Vulnerability Assessment?
 What is included in a Vulnerability Assessment?
 Key Features
 Benefits
 Q&A
Why Vulnerability Assessment?
 Small business fraud totalled $8 billion in 2010

 Week of June 13, 2011:
       23 critical security issues found in Adobe Shockwave Player
       12 critical security issues found in Java
       11 critical security issues found in Adobe Acrobat
       9 critical security issues found in Internet Explorer
       8 critical security issues found in Microsoft Excel


 While data breaches hitting major banks and corporations tend to dominate
  headlines, small businesses are increasingly becoming targets. Hackers like to
  prey on small businesses because computers and mobile phones tend to be
  used for both work and personal use, and many small businesses don’t have an
  IT staff monitoring and protecting operations.
What’s included in Vulnerability Assessment?
 A one time detailed scan and report on your business security
  exposure.

 Leverages industry-leading Security/Vulnerability Assessment
  software

 Non-intrusive, passive scanning does not impact network or
  device operations

 Provides detailed scanning & vulnerability reporting on a range
  of IP devices

 Includes prescriptive advice to remediate found issues
Benefits
 One-time, non-intrusive scan can save your business
 Prescriptive remediation accelerates time to repair found
  issues
 High/Medium/Low rankings let you address the most
  critical issues first
 Goes beyond application security to address hardware
  and operating system level vulnerabilities
Vulnerability Assessment




      Lionel Medina
 Lmedina@medinanet.com
   Tel: (866) 865-5307

Vulnerability Assessment Presentation

  • 1.
    Reducing the Riskof Successful Attack Lionel Medina Medina Networks 866-865-5307 x 3
  • 2.
    Agenda  Why VulnerabilityAssessment?  What is included in a Vulnerability Assessment?  Key Features  Benefits  Q&A
  • 3.
    Why Vulnerability Assessment? Small business fraud totalled $8 billion in 2010  Week of June 13, 2011:  23 critical security issues found in Adobe Shockwave Player  12 critical security issues found in Java  11 critical security issues found in Adobe Acrobat  9 critical security issues found in Internet Explorer  8 critical security issues found in Microsoft Excel  While data breaches hitting major banks and corporations tend to dominate headlines, small businesses are increasingly becoming targets. Hackers like to prey on small businesses because computers and mobile phones tend to be used for both work and personal use, and many small businesses don’t have an IT staff monitoring and protecting operations.
  • 4.
    What’s included inVulnerability Assessment?  A one time detailed scan and report on your business security exposure.  Leverages industry-leading Security/Vulnerability Assessment software  Non-intrusive, passive scanning does not impact network or device operations  Provides detailed scanning & vulnerability reporting on a range of IP devices  Includes prescriptive advice to remediate found issues
  • 5.
    Benefits  One-time, non-intrusivescan can save your business  Prescriptive remediation accelerates time to repair found issues  High/Medium/Low rankings let you address the most critical issues first  Goes beyond application security to address hardware and operating system level vulnerabilities
  • 6.
    Vulnerability Assessment Lionel Medina Lmedina@medinanet.com Tel: (866) 865-5307