Back to results

Cyber security services

Connectivity that enhances performance, security & agility

A well-designed network infrastructure is invaluable for your business. We can help your people connect to both wired and wireless networks, so they can get the job done. Enjoy improved network availability, reliability, performance and security with Ricoh as your partner.


Build your network defenses with IT Security Solutions

Ricoh's security offerings are delivered by a cross-functional team of experts. We'll protect your network, data and end-users from the threat of cybercriminals.

What we'll deliver:

  • Anti-virus and Anti-malware
  • Firewall and Perimeter Security
  • Server and Endpoint Security
  • E-mail and Web Security
  • Data Loss Prevention
  • Remote Access and Mobile Solutions

All Ricoh Security Assessments Include:


 

Vulnerability Assessment   Web Application Testing    Penetration Testing

         Social Engineering Testing


  Contact Us

 

Cyber security services

 

 

 

Vulnerability Assessment

This assessment gives you a full view of IT vulnerabilities and their levels of risk. Uncover everything that can pose a threat to your IT environment.



What We Do

  •   

    Gather information about your business through publicly available sources

  • List all internet-facing assets

  • Scan ports and exposed services

  • Assess all software for exposures and/or misconfigurations

  • Prioritize vulnerabilities and recommend solutions

 

 

 

 

 

Web Application Testing

Web applications are critical to your business. But you could risk malware distribution, breach of client data and a bypass of security controls if your security measures fail. Let us find your vulnerabilities before someone else does.



What We Do

  • Perform an automated vulnerability scan of servers

  • Manually test application logic for flaws

  • Make advantage of vulnerabilities to gain access to data

  • Provide a detailed assessment of identified vulnerabilities and recommended solutions

 

 

 

 

 

Penetration Testing

How could an attacker gain access to your data, and where are you most vulnerable? Our security consultants will perform a simulated attack on your business to identify gaps that could be exploited.

 



What We Do

  • Work with your team to identify goals for testing

  • Chain together multiple vulnerabilities to achieve testing goals

  • Bypass security controls such as anti-malware and two-factor authentications

  • Travel through a path of compromised hosts for access to sensitive areas within the network

  • Provide a detailed assessment of security controls and prioritized list of recommended solutions

 

 

 

 

 

Social Engineering Testing

How could an attacker gain access to your data, and where are you most vulnerable? Our security consultants will perform a simulated attack on your business to identify gaps that could be exploited.



What We Do

  • Attempt a breach through email phishing, application updates and password hacks

  • Test user behaviour to determine a baseline for weak security protocols

  • Provide a detailed assessment of all identified vulnerabilities and recommended solutions