Our clients often ask us to help them evaluate the security of their data and to implement security controls to better protect their data. Performing a thorough evaluation can be a daunting task for an in-house IT team, given the variety of infrastructure and controls that must be evaluated and the advanced nature of many data exploits in use by today’s attackers, and at the same time an “arms-length” evaluation process is fundamental to an objective evaluation.
Adding to the complexity of the data aggregation and evaluation process is the fact that data does not ‘stop’ at the network perimeter (at the ‘firewall’ so to speak). The need for remote work and remote access to the network or to cloud-hosted resources, mobile/ BYOD devices, and continuous interaction with vendors and business partners who receive, process, or store data necessitate a more holistic approach to data loss risk management and to due diligence testing processes.
For this reason Redpoint offers a comprehensive Data Loss Risk Assessment service, which focuses on the risk of data loss by vendors and other 3rd-party data collectors and processors.
Due diligence services we administer on behalf of our clients include: