CoNetrix Security Toolbox

The CoNetrix Security Toolbox system is used to independently collect audit data for both remote audits and onsite audits. For onsite audits, data is collected prior to the auditor arriving onsite, in order to effectively and efficiently use onsite time.

Engagements that use the CoNetrix Audit Toolbox

How it works

  1. CoNetrix Security Toolbox delivered and plugged-in to the network.
  2. Over a secure VPN, CoNetrix Security performs industry standard security scans and collects customized audit data.
  3. Audit data is secured using industry standard encryption and protocols. Any data collected with the Toolbox resides on an encrypted drive, and Toolboxes are reformatted after each engagement.
  4. CoNetrix Security provides easy-to-read reports with findings sorted by associated risk and estimated cost.
  5. Reports are typically delivered within 2 weeks of the scans.
  6. Reports include regulatory reference, statements of issues, recommendations for remediation, and a detailed review with a CoNetrix Security expert.
  7. Access to Tandem Audit Lite, a finding and response manager, is included with CoNetrix Security engagements. Audit Lite is a version of the Tandem Audit Management software limited to tracking CoNetrix Security engagements.

Why CoNetrix Security?

Knowledge and Expertise:

  • CoNetrix Security has conducted more than 1,000 different IT related audit engagements since 2001.
  • The CoNetrix Security staff has more than 500 years of accumulated information technology, network, and security experience.
  • The CoNetrix Security experts hold numerous security certifications, such as CISSP, SSCP, CISM, CISA, and other Microsoft and Cisco security specializations.
  • The CoNetrix Family of Companies includes numerous resources for CoNetrix Security to consult, including software developers, web developers, and IT engineers.

The CoNetrix Security Difference:

  • CoNetrix Security provides easy-to-read reports with findings sorted by associated risk and estimated cost.
  • Reports include regulatory reference, statement of issues, remediation recommendations, and a detailed review with an information and cyber security expert.
  • Access to the Tandem Audit Lite software, a finding and response manager, is included. Audit Lite is a version of the Tandem Audit Management software limited to tracking CoNetrix Security engagements.
  • A comprehensive work program is built upon:
    • FFIEC Cybersecurity Assessment Tool (CAT)
    • CoNetrix Security audit, testing, and consulting experience
    • FFIEC Information Technology Examination Booklets
    • Gramm-Leach-Bliley Act Standards for Safeguarding Customer Information
    • Information Systems Audit and Control Association (ISACA) audit guidelines
    • Information Technology Risk Examination (InTREx) Program
    • National Institute of Standards and Technology (NIST) Special Publications
    • The Center for Internet Security (CIS) Top Controls