Get a complete IT Security assessment
Executive-Level Security Risk Report
Security Policy Assessment Report
Shared Access Report
User Permission Report
This executive-level report provides just that.
Internal Vulnerabilities Report
This report highlights any deviation from industry standards and provides important information like open wireless networks and internet content accessibility.
External Vulnerabilities Report (Full Detail)
You’ll also receive a full NMap Scan which checks all 65,535 ports and shows you which are open. This item in particular is critical for many standard security compliance reports.
Who Has Access to Your Network?
Ontech’s IT Security Assessment scans your network and gives you an in-depth look at network areas that are typically the most vulnerable. We then provide you with 6 comprehensive reports that deliver all the information you need to know – right at your fingertips.
Your network is constantly at risk.
- How many emails are exchanged on a day-to-day basis within the company?
- How many web pages are visited each day with outdated internet browsers?
- How do you really know if employees are keeping their PC security software up to date?
- How do you know if Windows updates being run?
Firewalls, Tools and Internet Filters Aren’t Foolproof
If they were, we wouldn’t see the hugely publicized security breaches we see the news headlines today. When these tools address a security threat, a new one emerges.
Between email-based viruses sneaking in through unprotected mailboxes, to worms, viruses and malware, if you haven’t taken the steps to fully secure your system, you might be surprised what vulnerabilities you’ll find within your network.
You can’t monitor the security habits within the company, but you can run a check-up to find out just how “healthy” your business is security wise.
Our IT support and services have been rated 5 / 5 based on 10 testimonials from our clients.
Schedule a network security assessment
When you request a security assessment below, we'll contact you to schedule a complementary introductory meeting to discuss the details of the assessment and how we can best assist you.
*This security analysis is not all encompassing. However, the results of this analysis may prompt additional recommendations that are more focused on specific aspects of your environment. EX: PCI & HIPAA audits, in-depth anti-virus testing, firewall/router audit, etc.