Who Has Access to Your Network?
There are many ways a network can be compromised and unfortunately, few businesses realize what is actually going on “behind the scenes”. You might take the time to visit the doctor for your annual check-up, but when was the last time your business had a security check-up?
Ontech’s IT Security Assessment scans your network and gives you an in-depth look at network areas that are typically the most vulnerable. We then provide you with 6 comprehensive reports that deliver all the information you need to know – right at your fingertips.
Your network is constantly at risk.
- How many emails are exchanged on a day-to-day basis within the company?
- How many web pages are visited each day with outdated internet browsers?
- How do you really know if employees are keeping their PC security software up to date?
- How do you know if Windows updates being run?
Firewalls, Tools and Internet Filters Aren’t Foolproof
If they were, we wouldn’t see the hugely publicized security breaches we see the news headlines today. When these tools address a security threat, a new one emerges.
Between email-based viruses sneaking in through unprotected mailboxes, to worms, viruses and malware, if you haven’t taken the steps to fully secure your system, you might be surprised what vulnerabilities you’ll find within your network.
You can’t monitor the security habits within the company, but you can run a check-up to find out just how “healthy” your business is security wise.
John May – Solutions Engineer and Senior Tech
Get a complete IT Security assessment
Receive a FULL SCAN of your network.
Discover unsecure, vulnerable areas of your network.
The following 6 comprehensive reports deliver all the information you need to know to bulletproof your network from hackers and cyber criminals.
Executive-Level Security Risk Report
Business owners, executives and managers want to see high-level detail with summary charts, graphs, scores and an overview of any risks found. This executive-level report provides just that.
Security Policy Assessment Report
Our Security Policy report provides you with a detailed review of the domain-wide and PC based security policies in place within the company.
Shared Access Report
It’s good practice to manage file restrictions at an employee level. This report offers a comprehensive list of all network “shares” by computer, showing you, which users or groups have access to which files and devices – and what level of access they have.
User Permission Report
This report organizes permissions by user, showing all shared computers and files each user has access to.
This executive-level report provides just that.
Internal Vulnerabilities Report
Ever wonder how your business compares (security wise) to others in your industry?
This report highlights any deviation from industry standards and provides important information like open wireless networks and internet content accessibility.
External Vulnerabilities Report (Full Detail)
As one of the most comprehensive, detailed reports offered in this security assessment, the External Vulnerability report lists security holes, warnings and helpful tips that encourage you to make better network security decisions.
You’ll also receive a full NMap Scan which checks all 65,535 ports and shows you which are open. This item in particular is critical for many standard security compliance reports.
Schedule a network security assessment
When you request a security assessment below, we'll contact you to schedule a complementary introductory meeting to discuss the details of the assessment and how we can best assist you.
*This security analysis is not all encompassing. However, the results of this analysis may prompt additional recommendations that are more focused on specific aspects of your environment. EX: PCI & HIPAA audits, in-depth anti-virus testing, firewall/router audit, etc.