Case Study

Security Assessment

CLIENT

Cantonal University

Case Study

Security Assessment

CLIENT

Cantonal University

The Challenge

The IT team of a renowned cantonal university with a multi-site campus, which serves a large number of students and faculty, requested a professional assessment of the architecture, setup and operation of its firewall system. The university wanted to ensure that it was well prepared and that its setup and processes were well positioned to protect it from cyberattacks and potential security threats.

How we solved it

Arco IT conducted a thorough security assessment to identify cyber risks, including firewall assessments, vulnerability scans and connectivity testing. The comprehensive IT facility audit helped identify vulnerabilities and analyze systems to provide actionable recommendations.

PREPARATION

To get a detailed insight into the technical landscape, we conducted several interviews with the organization’s employees to learn about their IT functions and the technical architecture. Then, we assessed their systems from various perspectives

FIREWALL REVIEW 

We conducted connectivity tests for the firewall and an architecture analysis to review its configuration and compare it to best practices. To test for exploitable weaknesses, external and internal vulnerability scans were performed on the technical platforms. 

ANALYSIS

We then analyzed the risks and weaknesses of the system. For each risk we recommended suitable improvements to the architectural, operational, and/or network protection setup. Furthermore, we made product strategy and licensing recommendations. 

FINAL REPORT

All findings were discussed with the client in a final joint workshop-style meeting and the report with recommendations was handed over. The discussion allowed the team to improve their understanding of the threat opportunities and protection procedures. The proposed measures were categorized as high, medium, and low priority. The university has already implemented several of the recommended quick wins during the analysis. The important measures have been incorporated into medium- and long-term planning. 

RESULTS:

Regain confidence and control of your IT security

Take the first step toward safeguarding your data and reputation. Contact us today for a free consultation.