Security Assessments

Taking the “Secrecy” Out of Security

9 out of 10 computer networks have potentially serious IT problems sitting undetected. Infrastructure changes over time, possibly opening it up to new vulnerabilities. And new methods of attack are invented daily, so what was secure yesterday may not be secure today.

Your IT organization should have a list of security features to audit on a periodic basis. You can do many of them yourself, but there’s no substitute for having an independent expert occasionally check for your blind spots. Periodically assessing your IT security is an important part of your organization’s preventive maintenance plan.

Your IT Security Assessment will consist of the following elements:

  • Anomalous Login Report
  • Consolidated Security Report Card
  • Data Breach Liability Report
  • External Vulnerability Scan Detail
  • Login Failures by Computer
  • Login History by Computer
  • Outbound Security Report
  • Share Permission Report
  • User Behavior Analysis
  • Security Management Plan
  • Security Policy Assessment
  • Backup / Disaster Recovery (BDR) Needs Analysis

Our Reports Deliver Both Security And Serenity!

By performing regular security health checks, you can protect your assets, guard against downtime, and sleep better at night.

Top