Proxymity

Vulnerability Management and Intrusion Detection

  • Utilise appropriate endpoint detection and response tools, set endpoint anti-malware, anti-virus hardening and regularly reassess security baseline settings
  • Regularly perform information security assessments and vulnerability scanning across Proxymity’s applications, databases and infrastructure
  • Perform automated vulnerability scanning of Proxymity’s static code in relation to all new development activity
  • Prepare and execute an annual Penetration test plan covering all Proxymity applications, with findings reported, risk assessed and remediated in accordance with the internally agreed severity rating
  • Identify and apply latest relevant security patches to servers based on the applicable risk level, and at least within 30 days of patch availability
  • Fully assess identified vulnerabilities considering external CVSS/ CVE ratings, and more specific organisational and environmental factors, to determine an internal risk (priority) rating
  • Hold regular meetings with the CISO and security team to review open security tickets, agree risk ratings and review progress against remediation plans
  • Regularly review and manage Web Application Firewall (WAF) and network firewall configurations and settings in accordance with best practice

Stay in touch

Stay updated with the latest trends. Sign up for our newsletter.