IDENTIFY SECURITY LOOPHOLES IN YOUR NETWORK
Network Security Assessment
Through a full, comprehensive scan of your network Ontech Systems can help you identify unsecure, vulnerable weaknesses through our cyber security assessment.
Who Has Access to Your Network?
Ontech’s cyber security assessment scans your network and gives you an in-depth look at network areas that are typically the most vulnerable. We then provide you with 6 comprehensive reports that deliver all the information you need to know at your fingertips.
Your network is constantly at risk.
- How many emails are exchanged on a day-to-day basis within the company?
- How many web pages are visited each day with outdated internet browsers?
- How do you really know if employees are keeping their PC security software up to date?
- How do you know if Windows updates being run?
Between email-based viruses sneaking in through unprotected mailboxes, to worms, viruses and malware, you might be surprised what vulnerabilities are lurking within your network.
The following 6 comprehensive reports provide the information you need to know to secure your network from hackers and cyber criminals.
Executive-Level Security Risk Report
Business owners, executives and managers want to see high-level detail with summary charts, graphs, scores and an overview of any risks found. This executive-level report provides just that.
Security Policy Assessment Report
Our Security Policy report provides you with a detailed review of the domain-wide and PC based security policies in place within the company.
Shared Access Report
It’s good practice to manage file restrictions at an employee level. This report offers a comprehensive list of all network “shares” by computer, showing you, which users or groups have access to which files and devices – and what level of access they have.
User Permission Report
This report organizes permissions by user, showing all shared computers and files each user has access to.
This executive-level report provides just that.
Internal Vulnerabilities Report
Ever wonder how your business compares (security wise) to others in your industry?
This report highlights any deviation from industry standards and provides important information like open wireless networks and internet content accessibility.
External Vulnerabilities Report (Full Detail)
As one of the most comprehensive, detailed reports offered in this security assessment, the External Vulnerability report lists security holes, warnings and helpful tips that encourage you to make better network security decisions.
You’ll also receive a full NMap Scan which checks all 65,535 ports and shows you which are open. This item in particular is critical for many standard security compliance reports.
Schedule a Complementary Introduction
When you complete the form below, we'll contact you to schedule a complementary introductory meeting to discuss the details of the assessment and how we can best assist your security needs.
*This security analysis is not all encompassing. However, the results of this analysis may prompt additional recommendations that are more focused on specific aspects of your environment. EX: PCI & HIPAA audits, in-depth anti-virus testing, firewall/router audit, etc.