Phase 1: Access and Document Gathering
You provide us with network access and documentation.
Depending on the type of assessment you need, we may install tools to execute scans or get interviews scheduled to assess policies and procedures. These tools take time, so they'll run for a few days to a few weeks, depending on the size and complexity of your network.
Phase 2: Data Collection
Information is collected from the scanning software.
We’ll schedule a visit to your facility to learn about your processes, interview employees to assess secure behavior, and evaluate physical security as it relates to network access.
Phase 3: Report Preparation
Findings will be assembled in a Gap Analysis or IT Security report.
Recommendations for cyber security improvements will be included along with action items and priorities for next steps -- that way it's clear to the executives and stakeholders where the holes are and what needs to be done moving forward.
Phase 4: Delivery and Review
You'll get a high-level executive summary and detailed reports that we'll review together and answer your questions.
You'll get a clear picture of your security posture and insights you can use whether you work with us in the future or not.
Are You As Secure As You Want (or Need) to Be? Find Out For Sure