Cyber threats are becoming increasingly insidious: fortunately, there are essential services that companies, agencies and public administrations
must take into serious consideration to protect themselves from attacks and intrusions that can be devastating.
HyperGrid offers HyperSAFE, a Managed Security Service (MSS) that uses the latest technologies to protect your network. The so-called “Managed Security Services” are commonly entrusted to external providers specialized in this area, a situation that generates a great advantage for IT offices by ensuring that system administrators can manage their primary tasks without having to deal with security. In fact, the provider will take care of network security by blocking malware and viruses, data theft and performing exhaustive checks on the infrastructure. HyperSAFE is a system designed to make networks and computer systems impenetrable. The company’s team of experts is able to manage the infrastructure with solutions that monitor network resources in order to block tampering attempts and intrusions. All the tools and technologies used in the service are constantly updated both on the software and hardware side: for example, Cisco Talos databases are used for firewall management and vulnerability analysis, which are a real guarantee of security. These databases are created using telemetry sets based on billions of data and include millions of malware samples and intrusion analysis to ensure maximum effectiveness. The functions of a security service such as HyperSAFE can include a variety of tasks including 24-hour monitoring and management of intrusion detection systems and firewalls, supervision and management of software patches (and any hardware updates on obsolete devices), performing security assessments and responding immediately to alarms and emergencies. HyperGrid has structured the HyperSAFE service after a careful study of the methods used by cybercriminals and the analysis supported by the team of experts allows to adapt with maximum reactivity the countermeasures used for defense in order to provide customers with the best possible security even anticipating tampering attempts. Some of the checks can be performed remotely or automatically, but it is of paramount importance to carry out field checks in order to assess the actual compliance of the protection measures used.
THE PROCEDURE IN STEPS
The HyperGrid team analyzes network intrusion attempts, preparing appropriate solutions and intervening to correct system configurations. HyperSAFE is an elastic service, able to adapt to the needs of the customer and, for this reason, it is structured so that you can choose through which modes it is convenient to start the primary controls, as well as managing the choice on monitoring times and methods. Each phase of the procedure is carried out in full compliance with European legislation (GDPR) and consists of 5 phases.
Analysis of the steps that customers may require to perform:
First phase – Network mapping
This is a fundamental procedure that performs a detailed map of the network infrastructure and its organization. The HyperGrid team is able to point out and highlight any weaknesses and indicate the solution to remedy them.
Second phase – Identification of services and protocols
An in-depth analysis of the protocols and active ports of the entire infrastructure is performed and then audited for and mapped vulnerabilities. In this way it is immediately possible to highlight any weaknesses that could be used for attacks and infiltrations.
Third phase – Attack simulation
Not all customers may need this phase but, remember, it is one of the most important and recommended, especially if it is complex structures that guarantee access to numerous users. Verification tests are carried out on the infrastructure on the type of internet connection and on the response times of the systems. Exhaustive tests (manual and automated tests) are also carried out to analyze the protection systems. At the end of the analysis, the company’s technicians provide a report with a detailed indication of the critical points identified.
Fourth step – Verification and sensors
Manage daily audits and install IDS (Intrusion Detection System) sensors to trap cybercriminals trying to penetrate defenses. Recommended controls include intrusion testing, service interruption testing, website security analysis testing, traffic monitoring, and alarm rule activation.
Fifth phase – Alarm management
Identified any weaknesses in the management of network security, the HyperGrid team suggests the configurations to be adopted and the management and positioning of alarms.
www.hypergrid.it – firstname.lastname@example.org – +39-0382-528875