Where do you start?
IT security is made up of many facets. Anti-virus software, a network firewall and a mail protection filter have long been common practice in most companies. But even systems that do not seem security-relevant at first glance can become a problem if they are incorrectly configured and the attacker has landed in the network.
To prevent problems, it is therefore essential to „harden“ your existing hardware and software against attacks.
But where and how do you start? Even experienced system administrators can overlook small details in fast-moving IT with frequently changing requirements.
A RED THREAD.
A SECURITY GUIDE.
AN ANALYSIS TOOL.
With RESONATE you keep the overview.
FOR PENTESTERS, ANALYSTS, IT ENTREPRENEURS OR END CUSTOMERS
ANALYSE AND HARDEN IT ENVIRONMENTS
When you analyse your clients‘ IT, you do so dynamically – what works for one client may not work for the next. The path from initial foothold to full-breach is rarely the same, branches out in different directions and may even change over the course of an engagement. Nevertheless, follow a familiar approach to cover all eventualities as efficiently as possible and not miss anything. Even if you are not a dedicated penetration tester, but simply want to assess the security level of a client, you face the same requirement to create traceable test steps with clear results and recommendations for action.
In addition to ready-made catalogues, RESONATE also offers the possibility to create freely definable test catalogues yourself. In this way, you can achieve the same results across customers without having to rewrite and redefine everything each time, and you can proceed with the greatest possible flexibility.
THIS IS HOW IT WORKS
THREE STEPS TO MORE SAFETY
Analyse the environment.
You follow the test instructions in the respective test catalogue to get an inventory of your own IT or your customer’s environment.
Evaluate the results.
You discuss the findings and recommendations for action from step 1 with your team, your IT manager or your customer.
Hardening the environment.
They follow the recommendations for action already stored in the system resulting from step 2 to make the IT infrastructure more secure and harden it against attacks and failures.
THAT DISTINGUISHES US
WHY CHOOSE RESONATE?
A vulnerability scanner can find vulnerabilities in hardware and software automatically and selectively – but checking more complex interrelationships or evaluating concepts is not possible and requires manual effort to ask the right people the right questions.
RESONATE is a sophisticated audit and pentest tool to understand and assess the overall IT system.
Security also comes from working with systems that are regularly cleaned up and kept up-to-date. Through the recurring structured processing of inspection catalogues, an already hardened environment is again scrutinised to ensure long-term security. RESONATE provides the necessary overview – where were you a year ago and where are you now?
RESONATE’s databases contain over 20 years of IT experience. The application of the recommendations for action has been tried and tested with a large number of customers and is based on recommendations from internationally respected security experts as well as the manufacturers of the products themselves. Although this information is freely available on the Internet, it has to be compiled, tested and prepared in painstaking work. Users of RESONATE are spared this work!
Do you encounter unexpected problems when applying the test or curing measures? Our experts are there to help you in word and deed. Thanks to our strong international network, a wide range of knowledge and manpower is available.
CLIENT MANAGEMENT & AUTHORISATION SYSTEM
RESONATE has a three-tier authorisation system (read, write, own), and only allows those users to view client data who are authorised to do so. Each managed client can be split into additional sub-areas, allowing for special cases such as multiple directory services or multiple locations.
RESONATE comes with ready-made data catalogues that you can use to check and secure your infrastructure. In addition, you can create your own catalogues and easily reuse (link) the contents of the system catalogues. A completely freely structurable and nestable folder structure allows unlimited flexibility - for example, you could define a "hardening catalogue light" especially for small customers.
FINDINGS OVERVIEW & REPORTING
All findings and open measures of each client are listed in a central overview. This gives them a quick and uncomplicated statement of the most important next steps for hardening their infrastructure. Simple reports can be generated and sent for special services or reporting to the management.