Security Assessment And Management As a Service
EXCLUSIVELY FOR NYSBA MEMBERS
Security Assessment
Plus
An efficient and cost-effective offering that incorporates a comprehensive evaluation rather than a single stand-alone test.
Request a Quote for Security Assessment And Management As a Service
Security Assessment
Pro
A comprehensive service for security audit and amendment requirements, recommendation, risk analysis, and penetration testing.
Managed Detection
and Response
Provides people, process, and technology to protect your critical infrastructure, improve your security posture and reduce risk.
JDL Security Services | Security Assessment Plus | Security Assessment Pro | Managed Detection and Response |
---|---|---|---|
Web Application (Website) Scan | ✓ | ✓ | ✓ |
Internal and External Network Scan | ✓ | ✓ | ✓ |
Security Policy Review | ✓ | ✓ | ✓ |
High-level Remediation Suggestions and General Best Practices | ✓ | ✓ | ✓ |
Customize Technical and Summary Report; and Presentation | ✓ | ✓ | ✓ |
Initial network architecture review and recommendation | ✓ | ✓ | ✓ |
Recommendation on Hardware / Software replacement and upgrade or purchase | ✓ | ✓ | ✓ |
Compliance - HIPAA, PCI DSS, GDPR* | ✓ | ✓ | ✓ |
Web Application (Website) assessment and Penetration Testing | ✓ | ✓ | |
Internal and External Network assessment and Penetration Testing | ✓ | ✓ | |
Log Monitoring and Analysis | ✓ | ✓ | |
Active Directory Audit | ✓ | ✓ | |
Dark Web Scan | ✓ | ✓ | |
Overall risk analysis of network infrastructure | ✓ | ✓ | |
Virtual Chief Information Security Officer (VCISO) Services | ✓ | ||
Real-time Monitoring and alerting of core network infrastructure components | ✓ | ||
Web filtering / DNS Audit | ✓ | ||
24x7x365 Security Operations Center (SOC) | ✓ | ||
Malware and Forensic Analysis | ✓ | ||
Threat detection, triaging and forensics analysis | ✓ | ||
Remote incident investigation and response recommendations | ✓ |
* Compliance requirements and other services can be customized as add-ons.
Security Assessment Plus
- Web Application (Website) Scan
- Internal and External Network Scan
- Security Policy Review
- High-level Remediation Suggestions and General Best Practices
- Customize Technical and Summary Report; and Presentation
- Initial network architecture review and recommendation
- Recommendation on Hardware / Software replacement and upgrade or purchase
- Compliance – HIPAA, PCI DSS, GDPR*
Security Assessment Pro
- Web Application (Website) Scan
- Internal and External Network Scan
- Security Policy Review
- High-level Remediation Suggestions and General Best Practices
- Customize Technical and Summary Report; and Presentation
- Initial network architecture review and recommendation
- Recommendation on Hardware / Software replacement and upgrade or purchase
- Compliance – HIPAA, PCI DSS, GDPR*
- Add on Services*
- Web Application (Website) assessment and Penetration Testing
- Internal and External Network assessment and Penetration Testing
- Log Monitoring and Analysis
- Active Directory Audit
- Dark Web Scan
- Overall risk analysis of network infrastructure
Managed Detection and Response
- Web Application (Website) Scan
- Internal and External Network Scan
- Security Policy Review
- High-level Remediation Suggestions and General Best Practices
- Customize Technical and Summary Report; and Presentation
- Initial network architecture review and recommendation
- Recommendation on Hardware / Software replacement and upgrade or purchase
- Compliance – HIPAA, PCI DSS, GDPR*
- Web Application (Website) assessment and Penetration Testing
- Internal and External Network assessment and Penetration Testing
- Log Monitoring and Analysis
- Active Directory Audit
- Dark Web Scan
- Overall risk analysis of network infrastructure
- Virtual Chief Information Security Officer (VCISO) Services
- Real-time Monitoring and alerting of core network infrastructure components
- Web filtering / DNS Audit
- 24x7x365 Security Operations Center (SOC)
- Malware and Forensic Analysis.
- Threat detection, triaging and forensics analysis
- Remote incident investigation and response recommendations
* Compliance requirements and other services can be customized as add-ons.
About JDL
We protect your sensitive information, so you can do what you do best.
- 20+ Years of Experience.
- Globally Recognized Certifications.
- Dedicated Staff and Expert Consultants.
JDL Group is dedicated to one task: protecting your information and data. As a managed security service provider, our team is equipped to serve all your IT and computer security needs. We can assess your organization and provide the right security services for you. Data loss prevention, risk assessment, and network infrastructure are just a few of the services we offer.
The Evolution of Security
BASIC
- Passwords / Active Directory
- Patch Management.
- Backups
PERIMETER
- Firewalls
- SPAM / Web Filters
- WAF / Proxy
DEFENSE-IN-DEPTH
- Anti Virus / Advance Endpoint Protection
- DLP / SSL
- Anti – DDoS / IPS / CASB
DETECTION & RESPONSE
- Log Aggregation & Correlation
- Human / Threat Intelligence
- Incident Detection and Response
CONTAINMENT & REMEDIATION
- Intrusion Containment
- Remediation
- Policy Update
Security Assessment as a Service
JDL Group provides access to all the latest security tools and systems. We specialize in outsourced assessment, management and monitoring of all IT systems and devices.
Key Features
Application Vulnerability Assessment
- Identify, quantify, and prioritize vulnerabilities in an application
- Provide threat awareness and risk background
Network Security Assessment
- Identify and assign severity levels to security defects present in system or network
Log Monitoring
- Determine what is happening on network
- Logging records the traffic passing through the network
Penetration Tests
- Attempt to exploit system vulnerabilities
- Includes OS, Service and application flaws, improper configurations
- Risky end-user behavior
Dark Web Scan
- Discover compromised passwords from your Domain.
- Prospects data and credentials exposed via the dangerously untraceable dark web.
Security Policy Review
- Assist development and review of security policies
- Support to improve Security practices
Managed Detection and Response
We will assess your organization and provide the right security services for you. Data loss prevention, risk assessment, and network infrastructure are just a few of the services we offer.
