The subject of the offered service is the analysis of the company's data network operation. It consists in monitoring data flows and subsequent processing of the data obtained in order to provide maximum information on the state of the network in terms of operation and security, as well as to detect possible anomalies and security risks. The analysis includes designing the optimal distribution of network capacities, identifying critical points in the network, detecting internal and external attacks and identifying the services and users contributing most to the data network load.
The primary equipment used for network analysis is data flow monitoring equipment, specifically a probe with adequate power and number of monitoring ports. The probe is connected off-line and is purely passive. It is placed in the network for a minimum of 14 days. The first week is dedicated to collecting operational data and debugging the setup. The second week the collected data is compared with the baseline. At the end of the monitoring period, all data is evaluated by specialised software using behavioral analysis method and the result is compiled into a clear PDF report. The probe does not store any user data, only operational and location data.
Inventory and audit of the found devices are performed by scanner. The network is scanned in our selected segments to get an overview of the devices in the network. A set of tests are applied to the found devices according to the customer's specifications to detect security vulnerabilities. The ideal deployment duration of the devices performing the scanning and testing is a minimum of 7 days to cover normal business operations. A prerequisite for performing the analysis is the provision of independent remote access to the devices performing the analysis, inventory and vulnerability tests.