Cybersecurity Configuration Assessment

  • Home
  • Cybersecurity Configuration Assessment
Cybersecurity Configuration Assessment

The Tabiri cyber security team leverages open-source software agents deployed on your Windows, Linux and macOS systems to conduct security configuration checks. These checks are designed to benchmark each system’s configuration against well-known security industry standards, such as those developed by the Center for Internet Security (CIS).

Key phases of this task include:

  • Agent Deployment – installed software agents on customer’s systems that are in scope for this project.
  • Configuration Benchmarking – use automated scripts to analyze system configuration components such as user authentication, host firewall, and network sharing settings
  • Reporting – prepare detailed documentation of identified gaps and best-practice recommendations on how to close these gaps

image

Related Posts

Cybersecurity Vulnerability Assessment

The Tabiri Analytics team will conduct controlled testing of the organization’s computing infrastructure. Testing simulates

Read More

Cybersecurity Threat Hunting

This task leverages network sensors, software agents and cloud-based computing to collect and analyze system

Read More

Real time Cybersecurity Continuous Monitoring

The Tabiri Analytics team will collect and analyze various network telemetry and system logs for

Read More