+852 2170 7401

Information Assessment Service

Vulnerability management solution for preemptive and
cost-effective protection against security threats

Many people know the advantages of health check, it provides people detailed health conditions reports so that they could take preventive measures or seek for medical consultation early if anything goes wrong. The same applies for businesses’ networks, security threats can easily attack one’s network through system vulnerabilities. These attacks may bring devastating damages to businesses and they are costly to fix.

TrustCSI™ IAS is an information assessment solution for enterprises to identify vulnerabilities in business network infrastructure (Infrastructure Vulnerability Management, IVM) and web applications (Web Application Scanning, WAS) quickly and accurately, as well as provide remediation steps and blocking techniques. Detailed risk rating reports and recommendations from CITIC Telecom CPC’s certified security experts are provided so that businesses can take immediate remedy actions.

4-tiered approach for effective vulnerability management

4-tiered approach for effective vulnerability management

A comprehensive information security assessment solution for businesses’ entire IT network, which include:

Vulnerability Assessment to identify and prioritize risks in the network infrastructure;

Network Equipment Policy Assessment to ensure the highest level of network protection and performance through the policy review;

Web Application Assessment to identify potential or realized threats arisen from inadvertent mis-configuration, weak authentication, insufficient error handling and sensitive information leakage etc;

Network Infrastructure Design Assessment to evaluate and improve the network design for meeting the set IT objectives

  • The information assessment service is fully managed by experienced IT security specialists
  • Comprehensive information assessment to minimize the risk of non-compliance
  • Proactive identification and prioritization of risks to prevent possible threats
  • Comprehensive reports with actionable recommendations
  • Optional re-audit services to verify client's risk remediation actions