London: 020 0200 8142
Leeds: 0113 880 0722 Northampton: 01604 882 882

End Point Build Reviews

An endpoint device is used regularly to interface with a network and may be a workstation, laptop, smart phone or other mobile device. Higher levels of interaction warrant a detailed analysis of the device’s security, not just from the perspective of an external threat but also from that of an authorised user.

What can you gain from an end point built review or endpoint device audit from Perspective Risk?

  • You can give users the flexibility and access they need to do their work with the confidence that the risk of a compromise through endpoint device is severely reduced
  • You gain or maintain your legal, regulatory and contractual compliance through managing the risk of your endpoints

What does an endpoint build review or endpoint device audit involve?

  • Endpoint device audits are largely dependent on the device, but a typical audit includes a physical review of the device itself, a review of BIOS security features and hard disk encryption, a complete audit of the operating system against industry and government security guidelines, as well as its susceptibility to malware and virus infection
  • A comprehensive and thorough analysis of the device configuration, which cannot be performed using Network Penetration Testing alone
  • A combination of scenario-based testing, (e.g. stolen laptop/tablet) and traditional auditing methods to assess the security of end point devices – this approach to testing is far more effective than auditing alone and identifies nuances in the configuration of operating systems and installed applications which common auditing techniques can miss
  • A full report containing a detailed view of device security posture together with bespoke recommendations for your systems
  • The report includes detailed recommendations such as the exact command syntax for the device and its operating system to address the issues

Why choose Perspective Risk for endpoint build reviews?

  • Scenario-based testing is more effective
  • We cover all major technologies including Windows, OSX and Linux
  • You receive a prioritised report based on key gaps relevant to your organisation
  • We assess the effectiveness of device security controls from various threat perspectives
  • We verify that data on lost and stolen devices cannot be recovered
  • You can benchmark device configurations against industry and government standard practices

We are Perspective Risk

  • Information security is crucial to every aspect of your business – operational efficiency, profitability, business continuity, customer confidence, brand loyalty, protection against fraud and meeting regulatory requirements.

    Our penetration testing, pen testing, pen tests and cyber security testing has proven time and time again to be an effective security assessment of business IT infrastructure.

    Perspective Risk provides in-depth security assessments, risk management and compliance solutions to help you keep your confidential information safe and your critical systems secure. We’re innovative, flexible and supportive, helping you through any information security issues to deliver real business benefits and excellent value.

  • Call Me

    Pop your details in below and we’ll be in touch soon!

    • This field is for validation purposes and should be left unchanged.

    ×
    Get Quote
    • This field is for validation purposes and should be left unchanged.
    ×