BCMS
ISO/IEC 27001
ISO/IEC 27002
ISMS Protocol
FAQ
Cybersecurity

In our dedication to continue our purpose of protection of communities and consumers strengthened with our mission, values and vision, we provide Remote-Vulnerability-Assessment (RVA), CYBERSECURITY support. An RVA needs be carryout under a legally contracting binding agreement, which provides for prospect-organizations and client-organizations to test and report vulnerability of:

  • Networks,
  • Dedicated servers, and
  • Products

As noted previously, the RVA requires a contractual agreement as the authority to carryout, upon request of a prospect-organization or client-organization; to carryout an RVA requires adherence to applicable laws and regulations. Some of this laws include U.S.A. GLBA (Gramm-Leach-Bliley Act) and local applicable equivalent). BRS RVA are technical professionals manning the work, they are not exclusively an automated software.

For network assessing, RVA includes the network devices, which are integral of a working network system. Through RVA we will assess vulnerabilities within viable, feasible and known locations, et al, a remote scan of your server, network or product. The RVA is to scans identified hardware, firmware and software vulnerabilities, as well as other known and to be known network vulnerabilities.
 

A deliverable report is sent upon completion of the RVA (F-009), which includes up-to-date information related to the prospect or client-organization's vulnerability status. 

Upon completion of RVA, organizations may choose to implement and certify to current ISMS ISO/IEC 27001. ISMS implementation will help in the control of vulnerabilities and maintain a secure work environment. Expectations are, that the ISMS require that there be an IT role and responsibility in the organization.

 

Copyrights BRS  2017
Last Modified 12 Dec, 2017