Web applications are an increasingly common avenue of attack for hackers seeking access to confidential information. An improperly configured application can present an open door for such an attack. A security review of a software application evaluates its vulnerability to attack. The review process applies guidelines based on industry best practices to assess an application for known security vulnerabilities. If any security vulnerability is found, a solution will need to be identified and a timeline developed for applying a solution.
A security review may consist of the following elements:
Assistance is available for security reviews of servers and workstations. The review uses guidelines based on industry best practices to assess for known security vulnerabilities. If any security vulnerability is identified, recommendations can be provided to correct problems or deficiencies with a timeline for applying a solution.