{"id":2336,"date":"2024-10-16T14:32:04","date_gmt":"2024-10-16T12:32:04","guid":{"rendered":"https:\/\/www.isarnet.de\/network-security-audit\/"},"modified":"2024-10-16T14:38:34","modified_gmt":"2024-10-16T12:38:34","slug":"network-security-audit","status":"publish","type":"page","link":"https:\/\/www.isarnet.de\/en\/services\/network-security-audit\/","title":{"rendered":"Network Security Audit"},"content":{"rendered":"<div id='farbteiler'  class='av-layout-grid-container av-4uqtf-7ed2c0f90ada7b595d16473865c3f730 entry-content-wrapper main_color av-fixed-cells  avia-builder-el-0  el_before_av_layout_row  avia-builder-el-first   container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-4fkwn-412cc5e3c74aa73af17b50a2613aacc2\">\n.flex_cell.av-4fkwn-412cc5e3c74aa73af17b50a2613aacc2{\nvertical-align:top;\nheight:15px;\nmin-height:15px;\nbackground-color:#163e64;\n}\n.responsive #top #wrap_all .flex_cell.av-4fkwn-412cc5e3c74aa73af17b50a2613aacc2{\npadding:0px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-4fkwn-412cc5e3c74aa73af17b50a2613aacc2 av-gridrow-cell av_one_fourth no_margin  avia-builder-el-1  el_before_av_cell_one_fourth  avia-builder-el-first  content-align-top av-zero-padding'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-42h2j-1438d01a45ce65d98dddc84edb3f8036\">\n.flex_cell.av-42h2j-1438d01a45ce65d98dddc84edb3f8036{\nvertical-align:top;\nheight:15px;\nmin-height:15px;\nbackground-color:#215f9a;\n}\n.responsive #top #wrap_all .flex_cell.av-42h2j-1438d01a45ce65d98dddc84edb3f8036{\npadding:0px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-42h2j-1438d01a45ce65d98dddc84edb3f8036 av-gridrow-cell av_one_fourth no_margin  avia-builder-el-2  el_after_av_cell_one_fourth  el_before_av_cell_one_fourth  content-align-top av-zero-padding'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-32gmb-9cc97cbdd0c42c54235b6bd8c30bdc28\">\n.flex_cell.av-32gmb-9cc97cbdd0c42c54235b6bd8c30bdc28{\nvertical-align:top;\nheight:15px;\nmin-height:15px;\nbackground-color:#4e95d9;\n}\n.responsive #top #wrap_all .flex_cell.av-32gmb-9cc97cbdd0c42c54235b6bd8c30bdc28{\npadding:0px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-32gmb-9cc97cbdd0c42c54235b6bd8c30bdc28 av-gridrow-cell av_one_fourth no_margin  avia-builder-el-3  el_after_av_cell_one_fourth  el_before_av_cell_one_fourth  content-align-top av-zero-padding'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2xa9z-a2cf899273685a4393bb6bfecd920d0f\">\n.flex_cell.av-2xa9z-a2cf899273685a4393bb6bfecd920d0f{\nvertical-align:top;\nheight:15px;\nmin-height:15px;\nbackground-color:#a6caec;\n}\n.responsive #top #wrap_all .flex_cell.av-2xa9z-a2cf899273685a4393bb6bfecd920d0f{\npadding:0px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-2xa9z-a2cf899273685a4393bb6bfecd920d0f av-gridrow-cell av_one_fourth no_margin  avia-builder-el-4  el_after_av_cell_one_fourth  avia-builder-el-last  content-align-top av-zero-padding'  ><div class='flex_cell_inner'><\/div><\/div>\n<\/div>\n<div id='av-layout-grid-2'  class='av-layout-grid-container av-20be7-3ae796bc5a2dcbab1e4c014299b0905f entry-content-wrapper main_color av-flex-cells  avia-builder-el-5  el_after_av_layout_row  avia-builder-el-last  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1945f-6639aeb586708e2b96d8545991d972e8\">\n.flex_cell.av-1945f-6639aeb586708e2b96d8545991d972e8{\nvertical-align:top;\nheight:300px;\nmin-height:300px;\n}\n<\/style>\n<div class='flex_cell av-1945f-6639aeb586708e2b96d8545991d972e8 av-gridrow-cell av_one_half no_margin  avia-builder-el-6  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-twjj-7d8562378beb9a22c0feafb9c06305ae\">\n.flex_column.av-twjj-7d8562378beb9a22c0feafb9c06305ae{\npadding:10px 0 0 100px;\n}\n\n@media only screen and (min-width: 990px){ \n.flex_column.av-twjj-7d8562378beb9a22c0feafb9c06305ae{\npadding:10px 0 0 100px;\n}\n}\n\n@media only screen and (min-width: 768px) and (max-width: 989px){ \n.flex_column.av-twjj-7d8562378beb9a22c0feafb9c06305ae{\npadding:10px 0 0 25px;\n}\n}\n\n@media only screen and (min-width: 480px) and (max-width: 767px){ \n.flex_column.av-twjj-7d8562378beb9a22c0feafb9c06305ae{\npadding:10px 0 0 20px;\n}\n}\n\n@media only screen and (max-width: 479px){ \n.flex_column.av-twjj-7d8562378beb9a22c0feafb9c06305ae{\npadding:10px 0 0 10px;\n}\n}\n<\/style>\n<div  class='flex_column av-twjj-7d8562378beb9a22c0feafb9c06305ae av_one_full  avia-builder-el-7  avia-builder-el-no-sibling  first flex_column_div  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m1xwzies-be6bfc5b52895c8090b2e31e1a2382dd\">\n#top .av-special-heading.av-m1xwzies-be6bfc5b52895c8090b2e31e1a2382dd{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-m1xwzies-be6bfc5b52895c8090b2e31e1a2382dd .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-m1xwzies-be6bfc5b52895c8090b2e31e1a2382dd .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-m1xwzies-be6bfc5b52895c8090b2e31e1a2382dd av-special-heading-h2 blockquote modern-quote  avia-builder-el-8  el_before_av_textblock  avia-builder-el-first '><h2 class='av-special-heading-tag '  itemprop=\"headline\"  >Network Security Audit<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-m1xwzzwi-7c9fc6d17b3707c3023449b4e5f3cc4a '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p>IT systems form the basis for the business processes of modern enterprises. It doesn&#8217;t matter whether this is the Internet website, communication and data protection of sensitive data via the Internet, file and database services, electronic workflow systems or e-Commerce and Online-Trade systems, the dependency of an enterprise on its IT infrastructure has increased considerably. Hence, any compromises made in IT systems can also mean for your enterprise a noticeable loss of reputation, expensive loss of production or even a risk to your livelihood. For this reason, no enterprise cannot afford to neglect IT security any longer. This is precisely the reason why external and internal security audits should be implemented regularly.<br \/>The aim of the IsarNet Security Audit package is to optimise the security standard of your enterprise according to generally recognised industrial standards. For this purpose, we work in cooperation with you to find out the current level of IT security in your enterprise, determine weak points, implement risk estimates and finally work out concrete measures to eliminate deficiencies and to increase the IT security of your enterprise.    <\/p>\n<h6><strong>Scope of services of the Security Audit Package:<\/strong><\/h6>\n<ul>\n<li>Implementation of the audit by an experienced engineer with CCIE-certification and specialised skills in host and network security<\/li>\n<li>Formulation of the special objectives and main points of emphasis of the Security Audit as well as the specification of all agreements in a detailed audit concept prior to the audit.<\/li>\n<li>Review of your security policies, or if no policies exist, support with the formulation of your Security Policies<\/li>\n<li>Review of defined security-relevant work processes both in theory and practice in dialog with your employees.<\/li>\n<li>Review of your network-design according to security aspects<\/li>\n<li>External and internal safety check of your network components (port and vulnerability scans including configuration checks)<\/li>\n<li>Review of your firewall and VPN designs, as well as firewall audit of all current firewall products (CP Firewall-1, Cisco PIX, Gauntlet, Sidewinder, etc.)<\/li>\n<li>External and internal audit of selected Windows and Unix clients and hosts at operating system level<\/li>\n<li>Optional penetration tests, including War-Dialing and War-Driving (WLAN Security)<\/li>\n<li>Testing of your infrastructure for the &#8220;Latest Known Vulnerabilities&#8221; according to vulnerability databases (CERT, BugTraq, CIAC)<\/li>\n<li>Discussion of all results already during the audit on site with the audit and system managers<\/li>\n<li>Drafting of a detailed audit report with a measures catalogue for eliminating faults<\/li>\n<li>Final presentation of the results to the Audit Team and Management<\/li>\n<\/ul>\n<p>The service package described roughly here can be customized to be in line with your requirements and expectations and in accordance with the conditions of your company, of course. We guarantee an absolutely sound and discreet implementation of the audit. It goes without saying that all results of the audit are treated in absolute confidence.  <\/p>\n<h6><strong>Are you interested?<\/strong><\/h6>\n<p>A detailed and specific analysis of the requirements can only be made in dialog with you, of course. Please do not hesitate to <a href=\"http:\/\/www.isarnet.de\/ueber-uns\/kontakt\/\">contact <\/a>us. We would be delighted to prepare and make you an individual offer.<\/p>\n<\/div><\/section><\/p><\/div>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m1xx0l9t-1817e2606ac15f0573a2660175bffdff\">\n.flex_cell.av-m1xx0l9t-1817e2606ac15f0573a2660175bffdff{\nvertical-align:top;\nheight:300px;\nmin-height:300px;\nbackground:url(https:\/\/www.isarnet.de\/wp-content\/uploads\/2024\/04\/Fotolia_167945815_V-scaled.jpg) 0% 50% no-repeat scroll ;\n}\n<\/style>\n<div class='flex_cell av-m1xx0l9t-1817e2606ac15f0573a2660175bffdff av-gridrow-cell av_one_half no_margin  avia-builder-el-10  el_after_av_cell_one_half  avia-builder-el-last  content-align-top avia-full-stretch'  ><div class='flex_cell_inner'><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":2346,"menu_order":30,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2336","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Network Security Audit - IsarNet AG<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.isarnet.de\/en\/services\/network-security-audit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Network Security Audit - IsarNet AG\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.isarnet.de\/en\/services\/network-security-audit\/\" \/>\n<meta property=\"og:site_name\" content=\"IsarNet AG\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-16T12:38:34+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.isarnet.de\/en\/services\/network-security-audit\/\",\"url\":\"https:\/\/www.isarnet.de\/en\/services\/network-security-audit\/\",\"name\":\"Network Security Audit - IsarNet AG\",\"isPartOf\":{\"@id\":\"https:\/\/www.isarnet.de\/en\/#website\"},\"datePublished\":\"2024-10-16T12:32:04+00:00\",\"dateModified\":\"2024-10-16T12:38:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.isarnet.de\/en\/services\/network-security-audit\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.isarnet.de\/en\/services\/network-security-audit\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.isarnet.de\/en\/services\/network-security-audit\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.isarnet.de\/en\/home\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\/\/www.isarnet.de\/en\/services\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Network Security Audit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.isarnet.de\/en\/#website\",\"url\":\"https:\/\/www.isarnet.de\/en\/\",\"name\":\"IsarNet AG\",\"description\":\"Professional Networking\",\"publisher\":{\"@id\":\"https:\/\/www.isarnet.de\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.isarnet.de\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.isarnet.de\/en\/#organization\",\"name\":\"IsarNet AG\",\"url\":\"https:\/\/www.isarnet.de\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.isarnet.de\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.isarnet.de\/wp-content\/uploads\/2024\/03\/IsarNet_AG_300.png\",\"contentUrl\":\"https:\/\/www.isarnet.de\/wp-content\/uploads\/2024\/03\/IsarNet_AG_300.png\",\"width\":300,\"height\":127,\"caption\":\"IsarNet AG\"},\"image\":{\"@id\":\"https:\/\/www.isarnet.de\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Network Security Audit - IsarNet AG","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.isarnet.de\/en\/services\/network-security-audit\/","og_locale":"en_US","og_type":"article","og_title":"Network Security Audit - IsarNet AG","og_url":"https:\/\/www.isarnet.de\/en\/services\/network-security-audit\/","og_site_name":"IsarNet AG","article_modified_time":"2024-10-16T12:38:34+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.isarnet.de\/en\/services\/network-security-audit\/","url":"https:\/\/www.isarnet.de\/en\/services\/network-security-audit\/","name":"Network Security Audit - IsarNet AG","isPartOf":{"@id":"https:\/\/www.isarnet.de\/en\/#website"},"datePublished":"2024-10-16T12:32:04+00:00","dateModified":"2024-10-16T12:38:34+00:00","breadcrumb":{"@id":"https:\/\/www.isarnet.de\/en\/services\/network-security-audit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.isarnet.de\/en\/services\/network-security-audit\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.isarnet.de\/en\/services\/network-security-audit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.isarnet.de\/en\/home\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/www.isarnet.de\/en\/services\/"},{"@type":"ListItem","position":3,"name":"Network Security Audit"}]},{"@type":"WebSite","@id":"https:\/\/www.isarnet.de\/en\/#website","url":"https:\/\/www.isarnet.de\/en\/","name":"IsarNet AG","description":"Professional Networking","publisher":{"@id":"https:\/\/www.isarnet.de\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.isarnet.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.isarnet.de\/en\/#organization","name":"IsarNet AG","url":"https:\/\/www.isarnet.de\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.isarnet.de\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.isarnet.de\/wp-content\/uploads\/2024\/03\/IsarNet_AG_300.png","contentUrl":"https:\/\/www.isarnet.de\/wp-content\/uploads\/2024\/03\/IsarNet_AG_300.png","width":300,"height":127,"caption":"IsarNet AG"},"image":{"@id":"https:\/\/www.isarnet.de\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.isarnet.de\/en\/wp-json\/wp\/v2\/pages\/2336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.isarnet.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.isarnet.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.isarnet.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.isarnet.de\/en\/wp-json\/wp\/v2\/comments?post=2336"}],"version-history":[{"count":2,"href":"https:\/\/www.isarnet.de\/en\/wp-json\/wp\/v2\/pages\/2336\/revisions"}],"predecessor-version":[{"id":2339,"href":"https:\/\/www.isarnet.de\/en\/wp-json\/wp\/v2\/pages\/2336\/revisions\/2339"}],"up":[{"embeddable":true,"href":"https:\/\/www.isarnet.de\/en\/wp-json\/wp\/v2\/pages\/2346"}],"wp:attachment":[{"href":"https:\/\/www.isarnet.de\/en\/wp-json\/wp\/v2\/media?parent=2336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}