熊猫视频

Skip to main content
熊猫视频
熊猫视频
Industries
Resources
About Us

Information Technology Assessments

We can perform Information Technology Assessments to test the effectiveness of your controls or assess your existing IT environment and provide recommendations for improvement.听 We assess the security environment against industry standards, including policies, security, access control, data integrity, continuity plans, and more to help you better understand your IT landscape and how it can be further strengthened. Get a comprehensive evaluation of your environment that covers:

  • Information Security Program
  • Logical Access Processes
  • Access Review Processes
  • Access Administration Processes
  • Password Policy
  • Network Architecture
  • Security Log Monitoring
  • Endpoint Detection and Response
  • Mobile Device Administration Processes
  • Backup Processes
  • Physical Security
  • Change/Patch Management
  • Contingency Planning/Disaster Recovery

Vulnerability Assessments and Penetration Testing

Our vulnerability professionals identify security risks associated with your systems 鈥 and create strategies to eliminate them. We perform reconnaissance on your environment, scan for vulnerabilities, and simulate actual attacks to help identify potential security weaknesses through external, internal, and wireless vulnerability and penetration, and web application tests.

Social engineering tests that assess susceptibility

Is your organization security aware? Our multifaceted social engineering tests will tell you. We use email, phone, and in-person efforts to determine your vulnerabilities.

Control framework assessments that provide a clear picture

We assist clients by assessing their cybersecurity controls against independent third-party frameworks such as:

NIST Cybersecurity Framework (CSF)

Ideal framework for small and medium-sized businesses that provide a good foundational set of basic 鈥渃yber hygiene鈥 controls, which organizations can expand on as they mature

CMMC / NIST 800-171

Framework is intended for organizations that provide government services or products. Clients that hold 鈥淐ontrolled Unclassified Information鈥 are required to comply with CMMC / NIST 800-171

Center for Internet Security (CIS) Top 18

We can facilitate management鈥檚 self-assessment against the CIS鈥檚 recommended security controls.

Network Health Review

The Network Health Review is a comprehensive on-site and virtual assessment of your IT environment. It helps you understand the health of your IT environment with certainty. Even better, you鈥檒l get to speak to an expert about it, so you have full clarity. Our Network Health Review covers the physical and technical wellness of your infrastructure, including:

  • Server room(s)
  • Network scanning
  • Storage (SAN/NAS)
  • Servers (physical and virtual)
  • Backup and data protection
  • Network Infrastructure
  • Messaging and collaboration
  • Remote access
  • Business continuity/disaster recovery
  • Ongoing maintenance/patching
  • Monitoring

We鈥檒l study the environment, and you鈥檒l receive a 360掳 Assessment Analysis, Scanning Tool Analysis, and a Notes/Observations Report. Then a 熊猫视频 熊猫视频 Manager will walk you through the data and answer your questions. From Understanding to Impact After your Network Health Review, you鈥檒l better understand your organization鈥檚 IT strengths and have a targeted, impactful improvement plan.

360掳 Assessment Tool

熊猫视频 offers a 360掳 Assessment Tool to help organizations understand where they stand when it comes to their IT environment.

If you’re the technical resource managing IT for your organization take this 10-15 minute assessment below.

Upon completion, one of our technology professionals will connect within 1-2 business days to provide an assessment report which includes a result map and best practices scorecard, and discuss any potential risk areas.

If you aren’t the technical resource, but you oversee the technical resource managing IT for your organization, request a 30-60 minute appointment with one of our technology professionals who will connect and schedule a time to work through the assessment with you.

Once the assessment is completed, a report will be generated which includes a result map and best practices scorecard, and your 熊猫视频 representative will review the results and discuss any potential risk areas.

Request an appointment

We鈥檙e here to help.

Just send us a note and we鈥檒l do our best to get back to you as quickly as possible.

Jessica R. Dore, CISA

Principal, Risk Advisory Services

989.799.9580

"*" indicates required fields