Begin with a network analysis

 

We’ll provide your company with detailed information and recommendations on how to ensure your network is configured to work at peak performance. Our comprehensive network analysis includes:

 

Reports:
Client Risk Report
Full Detail Report
Asset Report
Change Management Report
Back-up and Disaster Recovery (DR) Report

Layer 2/3 Reports
• Layer 2/3 Diagram
• Layer 2/3 Detail Report – network connectivity by switches
• Layer 2/3 Detail Excel Export – Excel version of the Layer 2/3
• Layer 2/3 Diagram JPEG – full diagram of network connectivity of routers, switches, and end-points (severs, workstations, printers)

Internal Vulnerability Scan
Open Ports and Protocol Vulnerability that would be exploited ONCE a hacker is in your network – or by employees. INSIDE attacking INSIDE. This complements the external vulnerability scan performed with our Security Assessment module, which finds weaknesses at the network “edge” that could be exploited by external sources.

For more information contact us at sales@appliedtech.pro or call 636.274.8000 to discuss your access/network analysis requirements with one of our Account Mangers or Practice Leaders.