A Security Assessment is the measurement of a company’s security posture and aims to reveal any possible flaws in the systems, in order to define the correct countermeasures.
Security Assessments rely on:
• Vulnerability Assessment, which is mainly conducted automatically with the objective to find out all the vulnerabilities in the systems
• Penetration Testing, a process whereby someone manually proves that the vulnerabilities actually exist in those systems and are exploitable
NBSecurity favours a hybrid manner approach: not only automated scans but more than anything manual verification and testing.
We believe, in fact, that human intelligence is unlikely replaced and is still the source of high quality results.
Our qualified ethical hackers and experts will actively test the effectiveness of your cyber defences through internal and/or external attempts to find, track and prioritize your actual vulnerabilities.
Network Security Assessment (NetSA) reveals real-world opportunities for attackers to be able to compromise systems and networks in such a way that it allows unauthorized access to sensitive data or even take-over systems for malicious/non-business purposes.
This type of assessment is an attack simulation carried out by our highly trained security consultants in an effort to:
• Identify security flaws present in the environment
• Understand the level of risk for your organization
• Help address and fix identified network security flaws
Web Applications Security Assessment (WebSA) allows you to identify security vulnerabilities that are present in both your commercial and in-house developed web-based applications.
By testing the security of your web-based applications, NBSecurity helps you to:
• Identify security vulnerabilities and security design flaws affecting your web applications
• Understand the contextualized risk posed by issues found and the impact of security violations
• Reveal your exposure to internal (e.g.: malicious employees) and external attackers (e.g. malicious users and anonymous attackers)
• Learn your applications’ overall security posture and how the latter can affect your business
• Receive detailed recommendations on how to solve issues found, mitigate identified risks and improve the overall security stance of your web-based applications
Mobile applications are becoming more dominant than ever, this evolution has created a full range of new attacks that are not relevant in the classic web applications world.
During Mobile Security Assessment (MobSA) testing, NBSecurity simulates a multitude of attacks, both general application attacks and mobile dedicated attacks.
At the end of this assessment you will be aware of how a real hacker penetrates the different applications and retrieves confidential data.
In that respect, NBSecurity has created a research-driven mobile testing methodology that incorporates guidance from the OWASP Application Security Verification Standard.
Using a combination of manual and dynamic analyses, along with custom harnesses for automated fuzzing, NBSecurity’s mobile security testing provides verification and validation across all major control categories, including authentication, session management, access control, malicious input handling, cryptography at rest, and much more.
According to Gartner, the number of Internet-connected devices is expected to reach 50 billion by 2020. While (Internet of Things) IoT is going to improve life for many, the number of security risks that consumers and businesses are prone to face will increase exponentially.
IoT security ecosystem gathers embedded software, data, mobile application and cloud security.
In that sense, NBSecurity has created a research-driven IoT testing methodology that incorporates guidance from the OWASP IoT Security Verification Standard.
Our Internet of Things Security Assessment (IoTSA) covers the entire IoT ecosystem:
• Authentication/Authorization process
• Network Services analysis
• Encryption strength
• Mobile Interface
• Software/Firmware security analysis
Traditionally, SCADA environments were completely closed systems that used their own isolated equipment and networking protocols.
More recently, however, SCADA environments have become IP enabled and interfaced to IP gateways.
As a consequence, the risks to SCADA environments are growing and organizations are actively looking at vulnerability assessment and penetration testing against these resources.
The first stage of any SCADA Security Assessment (ScadaSA) test performed by NBSecurity is to understand the technologies in use, which can vary significantly, from old proprietary solutions to more modern web-based interfaces, with or without additional authentication solutions.
Once the solution is understood, NBSecurity’s consultants evaluate the potential attack vectors, develop an appropriate test plan and proceed testing.
As we understand the sensitive nature of testing Process Control and Industrial Automation systems, especially within live production environments, our team have developed a proven methodology to test systems with no interference to the availability and integrity of the process.
In carrying out the activities, NBSecurity incorporates guidance from the following methodologies:
NBSecurity works with the customer security team to define threat scenarios that will test effectiveness of company technology, policies and people and subsequently it combines a number of test strategies and techniques in order to gain access to pre-defined information assets.
NBSecurity organizes the activities in four actions, called rounds:
• information gathering
• privilege escalation
• lateral movement
• target acquisition
For each of the above-mentioned round, a score will be given to both the Red Team and Blue Team according to their ability in attacking and defending respectively.
Our Red Team Testing provides three different approaches based on the amount of information the tester knows about the targets, what the target knows about the tester or expects from the test, and the legitimacy of the test.
The tester engages the target with no prior knowledge of its defences, assets, or channels. The target is prepared for the audit, knowing in advance all the details of it.
The tester engages the target with no prior knowledge of its defences, assets, or channels. The target is not notified in advance of the scope of the audit, the channels tested, or the test vectors.
The tester engages the target with full knowledge of its processes and operational security, but the target knows nothing of what, how, or when the tester will be testing.
Advanced Persistent Threats (APT) represent the simulation of real-world advanced threats with the purpose to assess an organization's intrusion prevention, detection, and response capabilities.
The techniques used are 0-Day exploits, targeted social engineering campaigns, and custom attacks designed to bypass traditional controls.
The attacker is willing to plan, learn and move covertly to avoid detection, even if it takes months or years.
Actors are skilled, motivated, organized and well-funded and have specific objects (IP compromise, information disclosure, credibility damage, service disruption, etc.).
In preparation for the initial compromise, NBSecurity gathers information about the target organization's employees, through publically available tools: the human element is in fact one of the weakest links in security. For this reason, social engineering is often used to break into the organization, in the form of a spear phishing attack. Other popular infection methods include web application attacks, zero-day exploits, custom malware designed to evade signature-based detection, and other proprietary hacking tools.
The object is to establish a foothold in the target environment, and this can be reached through well-crafted, effective phishing emails that contain malicious attachment or embedded link. Once opened, the infected email initiates a call home across the Internet to systems controlled by NBSecurity, and deliver access to the target's internal network.
At this point the attacker can move laterally across client infrastructure and acquire administrator privileges over victim's computer until control is gained on other workstations, servers and infrastructure elements, and proprietary data are finally stolen.
We want to make sure your organization is prepared to defend against the most advanced existing threats. That’s why we are here to help you design the security architecture and find the most effective security solution for your enterprise.
Our goal is to reinforce your network evaluating together an integrated security strategy that uses multiple technologies applied across different possible points of attack.
Among the most current and innovative technologies available that we recommend, let’s mention next generation firewalls, sandboxing, and network access controls.
The approach used by NBSecurity is multi-vendor, in order to enable you to choose from a wider range of options and make sure to deploy the best solution for your company needs.
Adapt your security architecture by bringing together innovative security capabilities to prevent, detect and respond to advanced threats: our skilled and certified IT security experts are here for you!
Once the role of security team was to minimize the potential attack surface, protecting network perimeter and securing the endpoint. Today hardening walls is not sufficient anymore.
As recruiters, salespeople, and advertisers increasingly turn to social media for their ease of use, low cost, scale and accessibility, also cybercriminals find them appealing.
Social networks have in fact broaden companies’ borders, boosting connectivity, mobility and engagement across organizations, departments and people.
But, if on one side they facilitate positively companies’ presence and visibility, on the other they become a massive new attack vector, which exposes organizations to additional business risks, such as account hijacking, corporate impersonations, customer fraud, etc.
It’s here that security team comes into play: on one hand it must facilitate the digital expansion and collaboration, as something inevitable for conducting business in the modern world, on the other it’s responsible for ensuring it is done safely and securely.
For this reason, NBSecurity has engaged with two market leaders in the field of Social Media Security and Cyber Situational Awareness, giving its customers the possibility to discover how exposed are they and what is their digital footprint. By continuously monitoring across social media, dark social media and even dark web, security risks and business threats targeting the brand, the company’s employees and the customers come to light. Eventually scammers and fraudulent actors can be taken down.
Are you ready to discover how #sociallysecure are you?
In today’s cyber world, every organization should have good security incident detection and response capability, in order to defend against latest advanced threats. However, many companies lack a fully functional Security Operations Center (SOC), which is the heart of a good Security Incident Management process, mainly because of a shortage of trained security professionals, cost constraints, appropriate security tools and/or prudent incident management process.
NBSecurity can provide skilled resources either you want to outsource this function to a Managed Security Services Provider (MSSP) or you decide to build your own integrated SOC.
Our resources, in fact, in addition to security device monitoring and alerting, have extended capabilities for advanced threat detection and real-time incident response, containment and remediation. Moreover, we cover the entire lifecycle of a security incident--from initial detection through returning a network back to steady state operation.
So, entrust NBSecurity to optimize your security resources and maximize your security investment: our experts will work closely to your security team in order to reduce your security risk, enhance your detection capabilities and protect your most valuable assets.
You have the possibility to build your own SOC? NBSecurity helps you to
assess requirements and provide necessary support during the decision-making
process, as well as supply analysts to manage the SOC internally.
If you choose to operate a SOC as-a-Service, NBSecurity can be an experienced partner to efficiently manage your SOC directly from our internal lab and grant the highest level of professionalism.