Security Consulting Services Overview
Security Consulting Services Overview
Our comprehensive capabilities Aurora’s Security and Risk Consulting team provides the expertise and analysis to
span the entire information help you enhance your IT security posture, reduce your information security risk,
facilitate compliance requirements and improve your overall operational efficiency.
security space. We offer a
complete portfolio of services We have helped a variety of customers design their strategic security programs,
to help you define your strategy, assess and test their defenses, resolve critical information security breaches, and
meet their compliance mandates.
identify threats and risks, deploy
the right technologies and ensure
operational readiness to enable Application Security Assessment
your business through security. Our Application Security Assessment is designed to meet best practices for
application security. Industry regulations such as PCI, HIPAA and Red Flag require
Aurora helps you stay ahead
application security testing. Aurora can also assess custom-designed items such
of current threats and risks as web applications and commercial applications.
and make the right technology
investments to support your
Data Loss Prevention Technical Assessment
business. Our security experts
provide clarity around security The security industry has evolved to the point where data can now be granularly
strategy and policy design. tracked, monitored, blocked and reported. With so many forms of connectivity —
mobile devices, emails, spreadsheets, computer desktops, etc. — it is difficult to
For more information,
know where your data is and who has access to it. Aurora’s Data Loss Prevention
visit www.aurorait.com (DLP) Technical Assessment will address your organization’s need to more
tightly control data, and to know where data is from creation to modification
and transport, and finally to storage and destruction. Aurora helps you gain an
“The companies we used in the understanding of how information moves into and out of your organization and
will develop policies and procedures, plus supply the necessary tools to control
past have come onsite to do their
your data leakage problems.
scanning and testing. One of the
things that was different with Aurora HIPAA Security and Compliance Audit
is they did everything remotely. I was
Our HIPAA information security audit is an in-depth appraisal of an organization’s
unsure of how that was going to
adherence to existing policies and industry best practices, and identification of
work, but it worked out really well. areas of weakness that need to be addressed to meet business needs and/or
I was very happy with their work.” regulatory and compliance requirements. We will assess existing weaknesses and
develop countermeasures in three areas — people, process and technology — for
- Sheri Bardin, Stericycle HIPAA Security Rule requirements.
Aurora provides our clients comparative information and baselines against
industry standard practices in addition to the HIPAA mandated review items
in the Security Rule. A complete assessment, as required under the HIPAA risk
assessment specifications, includes interviews with personnel, system analysis,
policy and procedure review, and remediation suggestions.
aurorait.com 2510 W. 237th Street | Suite 202 | Torrance, CA 90505
888.282.0696 © 2016 Aurora. All Rights Reserved. All other logos and
info@aurorait.com trademarks are the property of the respective trademark owners.
Cyber Security Risk Assessment Security Policy Development
Our solution uses quantitative and qualitative methods Our complete set of security policies can be developed
to define the current and future state of your security including the infrastructure, third-party, asset
environment in a complete Cyber Security Risk Assessment. classification, accountability, personnel security, physical
We determine how your organization maps to best practices, and environmental security, communications security,
along with the steps needed to get to the next level of operations security, user education and awareness, access
security, and maintain a robust security environment as control, system development life cycle, business continuity,
change occurs. A Cyber Security Risk Assessment identifies disaster recovery, and regulatory compliance.
deficiencies and correlates them to practical solutions.
Security Training
PCI DSS Gap Analysis and Compliance Audit
People are often the weakest link and the most under-
Our PCI DSS Gap Analysis is designed to help a company invested component of an organization’s security strategy.
determine where gaps in its security infrastructure are, prior to Our security training fills this gap by providing interactive
a full PCI DSS risk assessment. Our assessment services identify on-demand and instructor-led education that is accessible
and scope the requirements for PCI compliance as it relates to 24x7. Training is role-focused and can be customized to
the company, its agencies, merchants and services providers. your security requirements and environment.
Our scanning services allow you to identify vulnerabilities
that may block your company from meeting the PCI security
requirements. Our reviews of education and training of Vulnerability Assessment
all stakeholders, network architecture, plus network and
Vulnerability analysis is the frontline in securing
application security procedures will provide a solid foundation
an organization. Aurora can develop custom-built
of recommendations that will allow you to anticipate issues
methodologies to utilize your personnel and financial
that may arise in a full SAQ or QSA review.
resources to help meet business goals. Vulnerability scanning
is a necessary tactical approach to securing all the “low-
Penetration Testing hanging” risk in an infrastructure. Tests will be conducted
against Internet perimeters and internal systems using real
Penetration Testing is the first tactical step many companies world attacks techniques in an automated manner.
take to begin the identification process for weaknesses
in their IT environment. Our security professionals use
proven techniques, methodologies and tools to detect Security Code Review
undesirable risks. Aurora will evaluate your technical,
Security code review provides insight into the “real risk”
administrative and management security controls, and
associated with insecure code. When used together with
conduct tests against your Internet perimeter using real-
automated tools and manual penetration testing, code
world attacks techniques — both automated and manual.
review can significantly increase the cost effectiveness of
We offer 3 types of Penetration Testing: an application security verification effort. Aurora combines
• External Penetration Testing automated and manual code analysis techniques in a multi-
• Internal Penetration Testing step process of familiarization, prioritization and analysis to
• Website Application Penetration Testing understand the context and make a relevant risk estimate that
accounts for both the likelihood of attack and the business
impact of a breach.
Phishing Simulation Risk Assessment
Our Phishing Simulation Risk Assessment measures the
current level of susceptibility by performing a controlled
Ready To Get Started?
attack against employees. Such an attack typically targets Contact us at 888-282-0696 or sales@aurorait.com
a subset of employees from each department within the to learn how Aurora Security Services can help you
organization. If appropriate, employees and departments accomplish your specific business and IT security
from different offices are also be included within the test, in goals. Explore further by visiting our website at
order to allow for the identification of any trends across the www.aurorait.com.
entire organization.
aurorait.com 2510 W. 237th Street | Suite 202 | Torrance, CA 90505
888.282.0696 © 2016 Aurora. All Rights Reserved. All other logos and
info@aurorait.com trademarks are the property of the respective trademark owners.