SekChek Local
An editor has nominated this article for deletion. You are welcome to participate in the deletion discussion, which will decide whether or not to retain it. |
![]() | This article or section is in a state of significant expansion or restructuring. You are welcome to assist in its construction by editing it as well. This template was placed by Djm-leighpark (talk). If this article or section has not been edited in several days, please remove this template. If you are the editor who added this template and you are actively editing, please be sure to replace this template with {{in use}} during the active editing session. Click on the link for template parameters to use.
This article was last edited by Djm-leighpark (talk | contribs) 6 years ago. (Update timer) |
Contributor note: Rewrite covering all SekChek products |
Initial release | 2006[1] |
---|---|
Type | Computer Security |
License | Proprietry |
Website | sekchek |
As of | November 2018 |
SekChek security audit and benchmarking toolset initially released by SekChek IPS in 2006.
History
The SekChek toolset as a set of automated processes to analyze the logical security profile of a computer.[2]. It was developed by former auditors from Deloitte and Touche in 2006.[1]
On 20 March 2018 SekCheck's website gave notice operations would cease on 31 May 2018. Reasons cited included SekCheks' business model being less relevant to the business environment in 2018, a surge in compliance and regulatory requirements including GDPR and monetary difficulties due to losses with the insolvency of a credit-card processor.[3]
Reception
The product was initially marketed as a security evaluator and was noted for providing comprehensive reports of the security vulnerabilty of a computer system.[4]
References
- ^ a b Bosavage, Jennifer (June 7, 2006). "New Service Seeks Out Security Gaps". Dark Reading. United Business Media. TechWeb. Archived from the original on October 25, 2018. Retrieved May 20, 2009.
{{cite news}}
: Unknown parameter|dead-url=
ignored (|url-status=
suggested) (help) - ^ "IT Security Review Services - SekChek". Deloitte. Archived from the original on February 4, 2007.
{{cite web}}
: Unknown parameter|dead-url=
ignored (|url-status=
suggested) (help) - ^ "Notice of SekChek's closure on 31 May 2018". SekChek. Archived from the original on 5 November 2018. Retrieved 5 November 2018.
{{cite web}}
: Unknown parameter|dead-url=
ignored (|url-status=
suggested) (help) - ^ Kearns, Dave (10 May 2006). "SekChek evaluates security". Network World. International Data Group. Archived from the original on 2 April 2012. Retrieved 20 May 2009.
{{cite news}}
: Unknown parameter|dead-url=
ignored (|url-status=
suggested) (help)
- "Audit Programs & ICQs" (Fee required). isaca.org.
- "AD Product Specifications" (PDF). SekChek Local.
- "SAM Product Specifications" (PDF). SekChek Local.
- "Compare Classic Software" (PDF). SekChek Classic.
- "SekChek Provides Independent Reality Check of OS Security" (Press release). Tippit Inc. June 27, 2006.
Independent, objective, and reliable evaluation of a company's computer security is the key deliverable of SekChek
- "Computer Security Evaluator SekChek Announces Brand New Product for On-Site Security" (Press release). Reuters. March 17, 2008.
- "Computer Security Evaluator SekChek Announces Compatibility with Microsoft Windows Vista" (Press release). DABCC. Oct 5, 2007.
- "Annual Specialist IT Audit Activity Report 2004/5" (PDF). LB Bromley Internal Audit Report. November 2006.[dead link]
- Carroll, Mariana (November 2006). "An Information Systems Auditor's Profile" (PDF). UNISA Dissertation.
These reports can be used to identify weaknesses as well as risk ratings and suggested corrective actions. These statements are supported by Mookhey (2004) when he asserts that "the use of these tools for security auditing is prevalentand driven mainly by the inherent complexity within information systems.
[dead link]