Maintaining Effective Network Security Posture

Northbrook, IL – July 28, 2009 - Maintaining an effective network security posture is a constant exercise in adaptation. Because threats are constantly evolving, and budgets are finite, 100% regulatory compliance is nearly impossible.

That means the task of understanding the overall security posture in near real time —and doing so in relation to evolving compliance requirements and threats — is time consuming, expensive and complicated.

In fact, the frequency and severity of today's security threats and vulnerabilities are forcing companies to intensify their focus on:

The objective for any organization is solid information - a regular scan of network vulnerabilities with a method for prioritizing alarms, automating security auditing, and consolidating the information required to meet reporting and regulatory requirements.


A real time understanding of a client’s security posture is the goal for Chris Lewis.  At any given time, Lewis is juggling two or three audits as part of his role as a technical security manager for Accenture. In this role, he manages security, compliance and Federal, state and internal audits for clients in the healthcare and other fields.

The networks he manages are very large, containing thousands of end-points including servers, workstations, network devices and IP phones.

As a technical security manager, Chris Lewis anticipates security issues that may disrupt client business operations by:

Identifying, monitoring, and understanding security alerts, and taking the time to manually audit security and configuration settings, can be time consuming and difficult in large, distributed deployments.

“Because of the complexity and volume of all the audits our client undergoes, we needed a way be proactive and stay one step ahead of the game,  to regularly scan their network in advance of the external auditors,” said Lewis.  “There are plenty of tools out there that will provide a scan of vulnerabilities. What we needed were tools that could prioritize alarms, automate security auditing, and consolidate the information required to meet reporting and regulatory requirements.”


Beyond-IP's AVDS performs a security mapping of an organization's network and simulates attacks originating from either the internal or the external network. Once the security mapping is complete, AVDS generates a detailed vulnerability report specifying the security breaches, along with several practical and easy-to-apply solutions to fix those vulnerabilities.

The engine is updated on a regular basis for the most recent security vulnerabilities. The updates include security vulnerabilities that were discovered by the company's research and development team, as well as those discovered elsewhere.

By installing the AVDS appliance-based solution, IT and network security managers get a real-time view of the entire network security topography and can clearly demonstrate compliance with emerging global IT security standards and integrity legislation.

AVDS conducts automated vulnerability scans on periodic basis: daily/weekly/monthly according to a pre-set schedule or on ad-hoc basis. Generate from these vulnerability trends for networks, organizations or down to the level of single IP address.

AVDS reports contain simple and applicable solutions to problems found. This in depth information shows how to fix and improve the security of your network, both as whole and for each of the devices in it. The solutions can be used globally and will prevent future vulnerabilities from occurring.  The recommended solutions include device specific information as well as custom tailored solutions for your environment.

About Accenture
Accenture is a global management consulting, technology services and outsourcing company. Combining unparalleled experience, comprehensive capabilities across all industries and business functions, and extensive research on the world’s most successful companies, Accenture collaborates with clients to help them become high-performance businesses and governments. With more than 186,000 people serving clients in over 120 countries, the company generated net revenues of US$23.39 billion for the fiscal year ended Aug. 31, 2008. Its home page is

About Beyond-IP, LLC

For organizations concerned about regulatory compliance or dissatisfied with the network security audit services provided by their consulting firms, Beyond-IP provides an Automated Vulnerability Management Appliance that provides a higher quality, lower cost network vulnerability assessment and management than any other alternative. The Automated Vulnerability Management Appliances performs a security mapping of your network and simulates attacks originating from either the internal or the external network. Once the security scanning is complete, the software generates a detailed vulnerability report specifying the security breaches, along with practical solutions to fix those vulnerabilities. Beyond-IP’s solutions allow simplified measurement, monitoring and management of vulnerabilities over time. To learn more, visit

Contact for Beyond-IP, LLC

Ben Bradley