Skip to main content
CASE STUDIES

Lost & Found

Challenge

Servionix was requested to perform a network assessment audit for an internet service provider. To the customer’s surprise, we found some vulnerable outdated hardware that was still providing VPN access to internal networks. The equipment had been marked as decommissioned five years ago yet was never powered-off and eventually forgotten. As a result, the customer was facing a potential cyber security risk from a piece of outdated, vulnerable network equipment that provided unmonitored VPN access to the internal network. The company was also running unnecessary costs of direct and indirect electricity consumption (power-on and air conditioning, respectively).

Continue reading

Ueba deployment

Challenge

A customer decided to deploy a UEBA solution without a pilot, requesting our expertise in verifying the hardware specifications and helping with deployment.

Servionix expertise showed that the hardware specifications provided were not aligned with the requirements. While working with the vendor, we also found that the customer received demo version specifications.

Continue reading

IT vs. Cyber Security, the never-ending story

Challenge

One of our clients, a respected financial institution, requested a vulnerability assessment of its web application. The initial vulnerability scan of the operating system and application level indicated that something was being hidden. We were further requested to perform a full comprehensive assessment, including penetration testing. During the latter, the application went down; based on our test report, the internal auditing team was able to discover that its IT department was hiding the application behind a firewall without fixing the vulnerabilities, which caused the application to misbehave.

Continue reading

Cyber Security M & A

Challenge

A customer acquired a crypto industry company and we were asked to audit the acquired organization. Our assessment of the information security, quality, and processes of the infrastructure exposed multiple flaws.

Continue reading

Isp network redesign

Challenge

The customer purchased and installed hardware with a limited budget; the solution was delivered and deployed by a contractor. As a result of the deployment, the resource usage increased to 85 percent of the customer’s hardware capacity, leaving no space for future growth and no reserve for peak loads.

Continue reading

Critical Infrastructure Company: Network Tuning Project

Challenge

During the pre-sale process for one of the vendors, our network engineer recognized a problem with hardware resources on the customer site: the hardware spec was appropriate for the needs; however, a significant number of devices were overloaded. We couldn’t continue a pilot without proper resources.

Continue reading