Security Assessment & Audits

Get Started with PowerOne Security AuditsThreats from the Internet are increasing at a staggering rate and data theft is reaching epidemic proportions. Protect yourself and your company before data theft occurs. With the PowerOne Security Assessment and Audit you can quickly identify and correct vulnerabilities before you cost you downtime or lost revenue.

Overview Assessments Sample Reports

Sample Reports


  • Security Risk Report - Executive-level report with total risk score along with summary charts, graphs and an explanation of the risks discovered in the security scan.

  • External Vulnerability Report - Comprehensive scan to your Internet Gateway points for open ports, protocol vulnerabilities, plus a full NMap Scan which checks all 65,535 ports for access and secuirty vulnerabilities.

  • Share Permission Report - Comprehensive list of all network shares by servers and workstations. The report will also detail which users and groups have access to which shares and what level of access they have.

  • User Share Permission Report - Organizes permissions by user, showing all shared computers and files to which the user has access to.

  • Login Failure By Computer Report - Detailed anaylsis of login failures by computer, date, and time.

  • Login History By Computer Report - Detailed anaylsis of login history by computer, date, and time.

  • User Behavior Analysis Report - Shows all logins, successful and failure, by user including service accounts.

Revenue Loss Mitigation

Data Theft and Network Attacks can cost a company thousands of dollars in lost revenue from downtime and IT resources and possibily open itself to millions of dollars lost in litigation. Protect your company now with a PowerOne Secuirty Assessment Audit!