Security Assessment & Audits

Get Started with PowerOne Security AuditsThreats from the Internet are increasing at a staggering rate and data theft is reaching epidemic proportions. Protect yourself and your company before data theft occurs. With the PowerOne Security Assessment and Audit you can quickly identify and correct vulnerabilities before you cost you downtime or lost revenue.

Overview Migration Login Now

How It Works

Our security experts will dispatch to your location and run a non-intrustive security scan on the network. There is no software or agents to install. PowerOne will also run a vulnerability scan from outside of your network via your Internet connections. Every device that is visable on the network via the TCP/IP networking protocol will be interviewed and cataloged. This will include devices connected via WAN and VPN connections. PowerOne will take that data and turn it into a user friendly audit report detailing all the discoverd vulnerabilities and recommenations for resolving those security concerns.

Your Security Assessment will consist of the following reports:

  • Secuirty Risk Report: This executive-level report will include the total risk score along with summary charts, graphs and an explanation of the risks discovered in the security scan.

  • Security Policy Report: A thorough anaylsis of your GPO and security policies at the domain level as well as the local workstation level.

  • Shared Permission Report: This report will generate a comprehensive list of all network shares by servers and workstations. The report will also detail which users and groups have access to which shares and what level of access they have.

  • User Permission Report: Organizes permissions by user, showing all shared computers and files to which the user has access to.

  • Internal Vulnerabilities Report: Hightlights differences between your network and industry standard best practice. Lists available wireless networks to bring awareness to potential Rogue Access Points

  • External Vulnerabilities Report: A comprehensive scan to your Internet Gateway points for open ports, protocol vulnerabilities, plus a full NMap Scan which checks all 65,535 ports for access and secuirty vulnerabilities

Revenue Loss Mitigation

Data Theft and Network Attacks can cost a company thousands of dollars in lost revenue from downtime and IT resources and possibily open itself to millions of dollars lost in litigation. Protect your company now with a PowerOne Secuirty Assessment Audit!