Limit exposure with a security analysis
We’ll provide your company with detailed information and recommendations on how to mitigate potential risks.
Our comprehensive security analysis includes:
Security Risk Report
This executive-level report includes a proprietary Security Risk Score along with summary charts, graphs and an explanation of the risks found in the security scans.
Security Policy Assessment Report
A detailed review of the security policies that are in place on both a domain wide and local machine basis.
Share Permission Report by Computer
Comprehensive lists of all network “shares” by computer, detailing which users and groups have access to which devices and files, and what level of access they have.
Share Permission Report by User
Organizes permissions by user, showing all shared computers and files to which they have access.
Outbound Security Report
Highlights deviation from industry standards compared to outbound port and protocol accessibility, lists available wireless networks as part of a wireless security survey, and provides information on Internet content accessibility.
External Vulnerabilities Full Detail Report
A comprehensive output including security holes, warnings, and items that can help make better network security decisions. This is an essential item for many standard security compliance reports.
Anomalous User Login Activity
The report uses mathematical modeling and proprietary pattern recognition to highlight potential unauthorized users who log into machines they normally do not access and at times they normally do not log in.
For more information contact us at email@example.com or call 636.274.8000 to discuss your business security requirements with one of our Account Mangers or Practice Leaders.