Network Assessment & Vulnerability Scan
How It Works
As part of our initial network assessment, we offer a free comprehensive evaluation of performance and security vulnerabilities.
We’ll help you institute security best practices for handling passwords and credentials, such as the usage of multi-factor authentication for remote access, critical accounts and administrative accounts, enforcement of a strong password policy, absence of default and/or shared accounts and more.
Step 1: We send you an executable by email. Click on it (simulating what happens when a link in an email is clicked).
Step 2: Let the executable run once. This takes between 5 minutes and an hour. Go about your normal routine as it runs.
Step 3: Our team will analyze your results and present our findings to you as to what a hacker would find on your network.
We analyze cloud drives, One Drive, DropBox, Box, SharePoint and other file-sharing programs. These findings include Security Patches & Vulnerability Management, as well as your Network’s Perimeter Defense. Our scanner will test whether your firewalls are configured correctly and whether they appropriately alarm.