Aurora Serviceflipbook
Aurora Serviceflipbook
About Us
Since 1990, security-conscious companies have turned to Aurora for support of their
relationship allows Aurora to serve a growing list of clients spanning across three
business units:
SLPs and NASPO Agreements frequently used as purchasing vehicles for State,
In each of these three business units, we have dedicated resources that focus on:
Professional Services - our highly trained engineers work with a set of premium
aurorait.com
©2020 - AURORA SYSTEMS CONSULTING, INC. ALL RIGHTS RESERVED.
[email protected]
All other logos and trademarks are the property of the respective trademark owners.
888-282-0696
OVERVIEW
We put our CUSTOMERS’ NEEDS FIRST , educating our customers on the latest
technology and product road maps, addressing key business requirements and
Our team is equipped with manufacturer and industry certifications for dozens of cyber
security disciplines. Public Sector accounts can leverage numerous specialized contract
aurorait.com
©2020 - AURORA SYSTEMS CONSULTING, INC. ALL RIGHTS RESERVED.
[email protected]
All other logos and trademarks are the property of the respective trademark owners.
888-282-0696
CYBERSECURITY FRAMEWORK CONSULTING SERVICES
Aurora’s Security Consulting Services team provides the expertise and analysis to help
you enhance your IT security posture, reduce your information security risk, facilitate
& 18 security domains to help your organization easily assess, remediate and deliver
DIY model with Aurora consulting services hybrid model will save on consulting fees
aurorait.com
©2020 - AURORA SYSTEMS CONSULTING, INC. ALL RIGHTS RESERVED.
[email protected]
All other logos and trademarks are the property of the respective trademark owners.
888-282-0696
OVERVIEW
Aurora’s Security Consulting Services team has vast experience in delivering service
engagements and assessments for small and large companies in almost all lines of
business from financial and healthcare, to manufacturing and high technology, to retail
and food service industries. Our team offers a wide range of services. Our range of
expertise, experience, proven scope and approach lets us be your partner in many aspects
Aurora’s Professional Services team constantly strives to attain the highest partnership
levels with our technology partners so that we can better leverage support, access new
products and roadmaps, strategic management relationships, and better pricing for our
customers. This also elevates our engineer’s capabilities as they are frequently required
to refresh their technical certification and training to meet constantly evolving standards.
These requirements include pre-sales knowledge of product features and benefits, POCs
aurorait.com
©2020 - AURORA SYSTEMS CONSULTING, INC. ALL RIGHTS RESERVED.
[email protected]
All other logos and trademarks are the property of the respective trademark owners.
888-282-0696
CYBER SECURITY RISK ASSESSMENT
business functions
measures
requirements
aurorait.com
©2020 - AURORA SYSTEMS CONSULTING, INC. ALL RIGHTS RESERVED.
[email protected]
All other logos and trademarks are the property of the respective trademark owners.
888-282-0696
HIPAA SECURITY & COMPLIANCE
Aurora provides our clients comparative information and baselines against industry standard
practices in addition to the HIPAA mandated review items in the Security Rule. A complete
assessment, as required under the HIPAA risk assessment specifications, includes interviews
with personnel, system analysis, policy and procedure review, and remediation suggestions.
Our cost-effective approach to security and compliance makes it affordable for any size
physical and logical security, and company practices for security confidential data.
recommendations standards
security measures
aurorait.com
©2020 - AURORA SYSTEMS CONSULTING, INC. ALL RIGHTS RESERVED.
[email protected]
All other logos and trademarks are the property of the respective trademark owners.
888-282-0696
APPLICATION SECURITY ASSESSMENT
applications.
All security assessments will involve, but are not limited to,
Input validation
Transport mechanism
Site design
Attempt to escape out of the network and application boundaries of the systems
within scope
aurorait.com
©2020 - AURORA SYSTEMS CONSULTING, INC. ALL RIGHTS RESERVED.
[email protected]
All other logos and trademarks are the property of the respective trademark owners.
888-282-0696
DATA LOSS PREVENTION ASSESSMENT
TECHNICAL ASSESSMENT
The assessment will run for 2 to 4 weeks, depending on the scope of engagement and
The required hardware and software is provided as part of the assessment, and agent
Raw data reports can also be provided to allow for immediate action on high risk
repositories
FEATURES BENEFITS
Recommendations for optimizing the Understanding of where unstructured data
Classify existing unstructured data by file Relate unstructured data to its application(s),
type, age, use, value to business, etc. from data lifecycle and application criticality
structure, use, and potential exposure information and its importance in achieving
aurorait.com
©2020 - AURORA SYSTEMS CONSULTING, INC. ALL RIGHTS RESERVED.
[email protected]
All other logos and trademarks are the property of the respective trademark owners.
888-282-0696
PCI DSS GAP ANALYSIS
review.
Fixed fee
aurorait.com
©2020 - AURORA SYSTEMS CONSULTING, INC. ALL RIGHTS RESERVED.
[email protected]
All other logos and trademarks are the property of the respective trademark owners.
888-282-0696
PENETRATION TESTING
Penetration Testing is the first tactical step many companies take to begin the identification
process for weaknesses in their IT environment. Our security professionals use proven
techniques, methodologies and tools to detect undesirable risks. Aurora will evaluate your
technical, administrative and management security controls, and conduct tests against your
Internet perimeter using real-world attacks techniques — both automated and manual.
Attempts to gain unauthorized user access to systems within scope and systems
connected to network
An assessment looks at the source code, the infrastructure, the operating systems
aurorait.com
©2020 - AURORA SYSTEMS CONSULTING, INC. ALL RIGHTS RESERVED.
[email protected]
All other logos and trademarks are the property of the respective trademark owners.
888-282-0696
PHISHING SIMULATION ASSESSMENT
such as downloading malware de- signed to give an attacker remote control over the
to the extent that often neither the individual nor the organization to which they
belong is even aware that an incident has occurred until it is too late.
EXECUTION TO
INFORMATION DEVELOPMENT OF EXPLORATION OF
ACHIEVE THE
GATHERING RELATIONSHIPS RELATIONSHIPS
OBJECTIVE
As part of your regular security assessments, have you ever performed a controlled
phishing attack?
Would you expect your employees to click on a malicious link within an email?
How many employees in your organization would you expect to perform those
actions?
Which offices and departments within your organization are most likely to be
Therefore, do you know where your security training budget is best spent for
Have you ever run security awareness campaigns? If so, how effective do you think
they were?
or would it go unnoticed?
If there were a response, would it be sufficient to mitigate the risk posed by the
attack?
aurorait.com
©2020 - AURORA SYSTEMS CONSULTING, INC. ALL RIGHTS RESERVED.
[email protected]
All other logos and trademarks are the property of the respective trademark owners.
888-282-0696
SECURITY TRAINING ASSESSMENT
People are often the weakest link and the most under-invested
LIST OF COURSES
SECURITY AWARENESS (30-45 MINUTES EACH)
AWARE-01 Security Awareness Training
SCORM Compliant
aurorait.com
©2020 - AURORA SYSTEMS CONSULTING, INC. ALL RIGHTS RESERVED.
[email protected]
All other logos and trademarks are the property of the respective trademark owners.
888-282-0696
VULNERABILITY ASSESSMENT
Architecture review
Fixed fee
Methodology development
procedures
aurorait.com
©2020 - AURORA SYSTEMS CONSULTING, INC. ALL RIGHTS RESERVED.
[email protected]
All other logos and trademarks are the property of the respective trademark owners.
888-282-0696
SECURITY POLICY DEVELOPMENT
compliance.
Code Protection
Network Security
Optimized implementation
Knowledge transfer
aurorait.com
©2020 - AURORA SYSTEMS CONSULTING, INC. ALL RIGHTS RESERVED.
[email protected]
All other logos and trademarks are the property of the respective trademark owners.
888-282-0696
SECURITY CODE REVIEW
Conduct security due diligence of key applications and 3rd party software
aurorait.com
©2020 - AURORA SYSTEMS CONSULTING, INC. ALL RIGHTS RESERVED.
[email protected]
All other logos and trademarks are the property of the respective trademark owners.
888-282-0696
AURORA PROFESSIONAL SERVICES
engagements and assessments for small and large companies in almost all lines of
retail and food service industries. Our team offers a wide range of services from
MATURITY PROGRAM .
strategies and consolidations. We have SMEs (Subject Matter Experts) on Data Loss
We constantly strive to attain the highest partnership levels with our technology
partners so that we can better leverage support, access new products and roadmaps,
strategic management relationships, and better pricing for our customers. This also
elevates our engineer’s capabilities as they are frequently required to refresh their
During all engagements, we work closely with the client’s staff, sharing information
and educating the staff when possible. We want to partner with our clients rather than
be a point solution provider. Security is a long process that cannot be solved by any
one engagement. The results of all engagements are tailored to the client’s requests,
needs and business goals, with constant communication every step of the way, and we
can speak to any level of the organization from CEO and CFO to technicians and
sales staff.
aurorait.com
©2020 - AURORA SYSTEMS CONSULTING, INC. ALL RIGHTS RESERVED.
[email protected]
All other logos and trademarks are the property of the respective trademark owners.
888-282-0696
SYMANTEC PARTNER SOLUTIONS
and experience within the Symantec security portfolio. With recognized expertise in
multiple Symantec solution sets and a high level of customer satisfaction, Aurora has
Our highly skilled staff of professional service engineers have solution expertise in the
Aurora's goal is to ensure that Symantec broad security solution sets are appropriately
aligned with organization’s key initiatives to maximize their return on investment. Our
needs, threat intelligence, emerging technologies, and shifting market strategies and
consolidations. We have SMEs (Subject Matter Experts) on Data Loss Preventions (DLP),
Encryption
NETWORK SECURITY
IDENTITY SECURITY Messaging Gateway
VIP Encrypted Traffic Management
MPKI (Digicert) Advanced Threat Protection
customers Federal
aurorait.com
©2020 - AURORA SYSTEMS CONSULTING, INC. ALL RIGHTS RESERVED.
[email protected]
All other logos and trademarks are the property of the respective trademark owners.
888-282-0696
MCAFEE PARTNER SOLUTIONS
Aurora has been a long-standing professional services partner of McAfee for over a
decade, with clients in various vertical industries ranging from education, healthcare,
and solution architects are highly qualified and experienced across the McAfee solution
portfolio.
Our highly skilled staff of professional service engineers have solution expertise in the
following areas: MVISION, Cloud Security, Endpoint Security, Cloud Access Security
Broker (CASB), Endpoint Detection & Response, Data Protection & Encryption, ePolicy
With Aurora service expertise and years as a managed service specialized partner they
Workload Protection
Intrusion Prevention
MVISION PLATFORM
MVISION ePO
MVISION Insights
customers Federal
aurorait.com
©2020 - AURORA SYSTEMS CONSULTING, INC. ALL RIGHTS RESERVED.
[email protected]
All other logos and trademarks are the property of the respective trademark owners.
888-282-0696
TENABLE PARTNER SOLUTIONS
load. Aurora is offering Vulnerability Management MSSP through tenable IO & SC.
With many years of experience in the health care, government and the private sector,
we are confident in our ability to reduce the attack surface of your environment.
Options
Configuration
Analysis
Assessment Aurora provides services for customers who
Enterprise
aurorait.com
©2020 - AURORA SYSTEMS CONSULTING, INC. ALL RIGHTS RESERVED.
[email protected]
All other logos and trademarks are the property of the respective trademark owners.
888-282-0696
BEYOND TRUST PARTNER SOLUTIONS
experience within the Beyond Trust Security Portfolio. Our highly trained engineers
can implement full integration of Beyond Trust Privileged Access Management (PAM)
solution access Active Directory environment for Desktops and/or Servers. The Aurora
team can also mass deploy Beyond Trust Agents as needed for endpoints.
SERVERS
PASSWORD
RETRIEVAL WORKSTATIONS
USERS ACCESS
REQUEST APPROVAL RULES
DEVICES
SESSION PROXY
APPLICATIONS
PRIVILEGED PASSWORD MANAGEMENT
DATABASES
23 Years in Business
Customer Segments:
Enterprise
SLED
Healthcare
Federal
aurorait.com
©2020 - AURORA SYSTEMS CONSULTING, INC. ALL RIGHTS RESERVED.
[email protected]
All other logos and trademarks are the property of the respective trademark owners.
888-282-0696
SOPHOS PARTNER SOLUTIONS
apart from its competitors is the ability to protect your devices from ransomware.
Sophos is unique because they use cryptoguard. This has the ability to do smart
machine learning for ransomware to protect files. If your files do get encrypted, it
Aurora IT has experienced professionals with Sophos implementation that can help
as needed
Android Devices
SLED
Partner on hosted on AzureSophos Healthcare
aurorait.com
©2020 - AURORA SYSTEMS CONSULTING, INC. ALL RIGHTS RESERVED.
[email protected]
All other logos and trademarks are the property of the respective trademark owners.
888-282-0696
INFRASTRUCTURE AND DATACENTER SERVICES
your current datacenter from On-Premise to AWS Cloud Infrastructure. Below are
AWS INFRASTRUCTURE
Build out your servers in the cloud to host your applications.
AWS AD CONNECTOR
Build out a Domain Controller on AWS and use AWS AD
AWS WORKSPACES
Desktop-as-a-Service setup which would allow your remote users to
use their own Laptops or Home Desktops, and access the Desktop
AWS APPSTREAM
Install applications on AWS Appstream to be accessible via an Internet Browser
This can also be accessible via Appstream 2.0 client from anywhere
Federal services
external accounts
infrastructure
aurorait.com
©2020 - AURORA SYSTEMS CONSULTING, INC. ALL RIGHTS RESERVED.
[email protected]
All other logos and trademarks are the property of the respective trademark owners.
888-282-0696
INFRASTRUCTURE AND DATACENTER SERVICES
you configure your On-Premise and/or Cloud Datacenter. These include but not
CLOUD ON-PREMISE
Azure Active Directory standalone or Hybrid Active Directory and GPOs for security and
Microsoft Office 365 for your Emails Microsoft Exchange Server for your Mail system
New Build or Migrating from Microsoft Exchange New Build, Migrations, Upgrades
Server On-Prem to Office 365 Windows Server Update Services (WSUS) for
Microsoft 365 Data Loss Prevention (DLP) with Azure Clustered Services for backend Microsoft SQL
Utilize Keywords and Regex for DLP policy use on System Center Configuration Management
Microsoft Teams, and Windows Endpoints File Shares with Distributed File System
Utilize Exact Data Matching (EDM) for DLP Policy use Replication (DFSR)
Policy
management
Microsoft Azure
aurorait.com
©2020 - AURORA SYSTEMS CONSULTING, INC. ALL RIGHTS RESERVED.
[email protected]
All other logos and trademarks are the property of the respective trademark owners.
888-282-0696