IT SECURITY TESTING & ADVISORY SERVICES
Lateral Longitude™ – Asset Tracking and Vulnerability Management

Overview

Lateral Longitude™ a fully managed ICT service designed to identify, map, track and independently report on IT security vulnerabilities of all IP connected IT assets within any enterprise or business that are connected internally or externally to the Internet.

This service is customised for each client and is specifically aimed at organisations that have sensitive data or systems that require regular system security checks to maintain or improve security over time. Lateral Longitude™ is specifically designed and implemented to preserve and secure client data, unlike some other third party vendor systems.

This service includes:

  • Independent verification of third party vendor security practices
  • Identification of key security vulnerabilities within an enterprise organisation
  • Provides a prioritised list of remediation activities
  • Third party vendor management (checks that vendors are patching and carrying out security updates in relation to industry best practise or a contracted SLA)
  • Includes internal/external networks and connected systems
  • Detailed monthly reporting
  • Escalation of urgent issues

Benefits:

  • Reduced staff overheads, enhanced security compliance and independent ongoing assurance
  • Tracking of vulnerabilities over time,
  • Capability to capture forensic data if required
  • Incentivises staff and tracks organisational compliance over time

Service details:

  • Independent internally hosted scanning engines combined with external data capture
  • Remote or external access is not required so all data stays within the enterprise
  • Ability to manage multiple internal/external network segments
  • Flexible annual service model after successful trial period

More information

Get in touch for more information about how we can help.

^ BACK TO TOP
PCI DSS Managed Service

Overview

PCI DSS is a security standard for payment cards. Under PCI DSS version 3.2, companies are required to regularly have their security systems and processes tested and to provide a “clean” report once per quarter to financial organisation requesting the certification (usually your acquiring bank).

Lateral Security provides a monthly managed service offering and uses PCI council certified scanning tools.

SERVICES

Lateral Security can help you to meet the following PCI DSS requirements:

  • Monthly advanced notification scan (pass/fail/remediation recommendations)
  • Quarterly final report ready for your acquiring bank

PCI DSS Standards

  • PCI DSS requirement 11.1 - wireless access point presence and detection of unauthorised wireless access points (quarterly)
  • PCI DSS requirement 11.2 - internal and external vulnerability scanning (quarterly)
  • PCI DSS requirement 11.3 - external and internal penetration testing (annually and after any significant infrastructure or application upgrade or modification)

More information

Get in touch for more information about how we can help.

^ BACK TO TOP
SPAM (Email) Monitoring Service

Overview

A Microsoft security report estimated that over 97% of email received by organisations is unwanted or spam email. All of these unwanted messages require time and effort from staff to review. Lateral Security offers an effective simple solution to assist organisations, which we capture and manually review these emails on behalf of your organisation. We provide alerts either daily or weekly, along with monthly reports to clients on which emails are real, malicious or require attention.

This alleviates your staff spending time investigating suspicious emails and eliminates the threat of inadvertently clicking on a link which results in the compromise of your organisations IT system.

This service includes:

  • Daily/weekly email monitoring
  • Identification of, alerting and assessment of malicious activity
  • Detailed monthly report (summary of actions, capture of data, audit data)
  • Escalation of urgent issues

Benefits:

  • Reduced staff overhead
  • Enhanced understanding of the threats to the organisation
  • Reduces risk of phishing attacks compromising the organisation IT system

More information

Get in touch for more information about how we can help.

^ BACK TO TOP