Case Studies

Where your Network Ends: Discovering the Perimeter

Our client wanted us to develop a standard, Web-app security architecture. We identified the Web-apps that were exposed to the internet – the client’s de-facto perimeter. As a result of this inventory, we were able to produce an architecture for them that mitigated the current, and potential, security risks.

Finally, we put together a security Web-app policy that outlined the client’s security risk position and their risk acceptance stance.

Leave a Reply

Your email address will not be published. Required fields are marked *