The goal of a security assessment (also known as a security audit, security review, or network assessment), is to ensure that necessary security controls are integrated into the design and implementation of a project. A properly completed security assessment should provide documentation outlining any security gaps between a project design and approved corporate security policies.
Network Detective is the industry-leading IT assessment tool used by thousands of managed service providers to prospect and close new business, create new revenue-generating services, demonstrate value to customers, and streamline service delivery. Network Detective goes way beyond just network discovery and documentation to provide real “value-added intelligence” to your IT Assessments. Our proprietary data collectors compare multiple data points to uncover hard to detect issues, measure risk, provide recommended fixes, and track remediation progress.
Unlike any other IT assessment product, there are no agents, probes or software to install. The small executable scan files run from a thumb drive plugged into any computer in the domain. In most cases the scans complete in well under an hour. So while you’re walking around the prospect site, taking notes and making your pitch, Network Detective diligently gathers a mountain of network data and saves it in a safely-encrypted file on your thumb drive. When complete, it leaves no “traces” of your activity, no conflicts with other applications, no firewall issues, and nothing to remember to uninstall.
Network Detective’s proprietary Risk Scoring algorithm not only uncovers threats to the network but assigns them a Risk Score based on network impact. The Risk Score allows you to prioritize the remediation of individual issues and measure network health over time. Your clients may not be able to get all the complicated technical jargon but they will better appreciate your services with easy to understand tables and graphs showing monthly improvements to their network.
A complete set of reports touch on the broadest range of systems, network assets, settings, configuration, installed applications and endpoint security issues. It also includes a site diagram, and detailed information in Excel format that you can manipulate or integrate into your PSA.
A full set of security reports focus on network and user-related security risks, designed to allow you to offer a basic Managed Security Service. The reports reveal which users have access to what systems, and what systems are configured with what permissions. Also includes external vulnerabilities scans and Dark Web password exposure.
Digs into Azure AD and the Microsoft 365 (formerly Office 365) productivity cloud and generates reports to gain insights about what’s going on inside “the black box.” Includes Cloud Risk and Cloud Management Reports, a Configuration Change Report, a Cloud Security Report, plus separate assessment reports for the SharePoint, OneDrive and Teams services, plus the Outlook webmail app.
Remote Monitoring and Management (RMM), Endpoint Management & Network Monitoring.