The Need for IT Security Assessments
By performing regular security health checks with Solar, you can help protect your assets and guard against downtime; it’s the fastest way to expose security threats and vulnerabilities.
Our security assessments go way beyond just network discovery and documentation to provide real “value-added intelligence” about your business. Our proprietary data collectors compare multiple data points to uncover hard to detect issues, measure risk based on impact to the network, suggest recommended fixes, and track remediation progress.
Non-Intrusive Reports in One Visit
Unlike most other IT assessment products, there are no agents, probes or software to install. The small executable scan files can be accessed via our website or run from a thumb drive plugged into any computer in the domain, and in most cases the scans can be completed in well under an hour.
Solar’s IT assessment is the only tool set on the market that is fast, easy-to-use, completely non-invasive, and affordable for any business or IT professional.
Your Personal Business Report
Your IT Security Assessment will consist of the following elements:
This executive-level report includes a proprietary Security Risk Score along with summary charts, graphs and an explanation of the risks found in the security scans.
A detailed review of the security policies that are in place on both a domain wide and local machine basis.
Comprehensive lists of all network “shares” by computer, detailing which users and groups have access to which devices and files, and what level of access they have.
Organises permissions by user, showing all shared computers and files to which they have access.
Highlights deviation from industry standards compared to outbound port and protocol accessibility, lists available wireless networks as part of a wireless security survey, and provides information on Internet content accessibility.
A comprehensive output including security holes, warnings, and informational items that can help you make better network security decisions. This is an essential item for many standard security compliance reports.
Methodically analyse login history from the security event logs. The report uses mathematical modelling and proprietary pattern recognition to highlight potential unauthorized users who log into machines they normally do not access and at times they normally do not log in
How it Works
Step 1. You Run Our Data Collectors. We have built a unique library of proprietary network scanners designed to gather an enormous amount of network, machine and end-user data…
Step 2. We Collect the Data from any device that’s connected to your network centrally through the Network Scanners. Collected data is encrypted and automatically saved to a specified location.
Step 3. We’ll Send Your Reports. We’ll combine the data gathered at your site and run it through our assessment tool, which automatically assembles and combines everything into a single data set to give you a fully-integrated set of reports.
Our security services can be provided as a one-time IT security assessment, or a regularly-scheduled managed security service.
If you would like to trial our security assessment service we can provide your first report completely Free of charge.