Modern IT environments can be complex, increasing cyber security risk due to:
- Older software and patches that are no longer supported
- Unknowingly downloading malware via non-genuine digital downloads or online purchases from unknown vendors
- Removable media such as flash drives used to install inappropriate software
- Unauthorised personal devices connecting to the corporate network
- Terminated vendors or employees that continue to have access to IT systems
Implementing cyber security best practices and procedures will help you:
- Securely manage software assets and promote proper cyber security practices
- Build a resilient and adaptive IT infrastructure that can respond to threats quickly
- Ensure that you have a secure IT infrastructure that provides an effective defence against attacks
- Minimise data loss, fraud from theft and employee downtime, resulting in decreased costs and increased efficiencies
What to expect from a SAM Engagement
Every engagement will be slightly varied depending on your infrastructure, needs and goals. At a high level, an engagement can be broken down into four phases – Planning, Data Collection, Data Analysis and Final Presentation.
- Planning – the planning phase consists of gathering information from you on your infrastructure background and identifying plans and goals of the engagement, setting up appointments and arranging access to begin data collection and analysis
- Data Collection – the data collection phase includes the discovery and inventory of software assets, followed by the mapping of inventory data, usage and licence entitlements. Questionnaires and interviews with key stakeholders may be employed to ensure all relevant data and information is collected to provide a full and accurate analysis
- Data Analysis – the data analysis phase includes the review and validation of all collected usage, licence entitlement, deployment and other data. An analysis of your current cyber security state versus your long-term strategy and goals will also be performed. During this phase, results will include an assessment of your organisation’s potential vulnerabilities and overall cyber security maturity and provide recommendations on how you can minimise your cyber security risk
- Final Recommendations – at the conclusion of the SAM Engagement, we will present our results, recommendations and next steps in an overview presentation along with a set of detailed reports
Data Collection and Analysis
The goal when interpreting your inventory data is to detect what assets need to be protected and pinpoint areas that pose risks, including connections to external systems such as your banking partner, supply chain vendors and customers. Through Clarity, Phoenix will identify areas for improvement and develop a set of recommendations and processes to help your organisation optimise its software investments and stay compliant. The data collection and analysis will include the categories defined below.
As a starting point, we define the scope of the machines to be inventoried, identify the extra steps needed to gather data from devices and networks that may not be easily accessible, and prepare environments for scanning and data collection. Once the inventory is complete, we will work with you to conduct a cyber security assessment.
Data Interpretation and Technical Requirements
Analysing the results from the inventory data collection involves identifying and documenting all product deployments, usage and licence entitlements. We will consolidate data collected from different inventory tools and map the data to critical information that supports you in making informed decisions. For example, mapping deployment data to product support lifecycles will provide you insights into when software needs to be upgraded. We will also analyse how software and network access is currently monitored.
We will then identify any potential changes that need to be implemented to decrease your cyber security risk. This may include installing security updates regularly, keeping antivirus software active and up-to-date using the most recent versions of software and starting to monitor and manage personal device use at work.
We will help you assess whether you are properly licensed and using genuine software for your current deployment and usage state, and recommend the optimal licensing options for your future goals based on the information gathered during data collection.
Another important aspect of any cyber security programme is to be proactive in avoiding the risks associated with cyber threats by establishing policies around software piracy, malware, information theft, imposter fraud, and other forms of cyber crime. Phoenix Software will assist you in defining and implementing policies and processes to manage an ongoing cyber security programme.