Network Analysis SpecialB2019-12-26T10:25:24-07:00
Call us
Request an analysis

Our Unique Approach

There’s no need to worry about risking your privacy since no password or file data is ever captured from your network. Instead, our agent is installed temporarily and captures system logs and event data only.

What You Get

Our detailed Network Analysis Report is a 6-8 page Executive Summary that provides an overview of the devices on the network along with a Network Risk Score and analysis of each potential issue uncovered. We will review this document with you and discuss our findings in detail with you to answer any questions you may have.

Network Infrastructure

  • DETECT DOMAIN CONTROLLERS

  • USER ANALYSIS

  • NETWORK DISCOVERY FOR NON-A/D DEVICES

  • INTERNET DOMAIN ANALYSIS

  • PASSWORD STRENGTH ANALYSIS

  • MISSING SECURITY UPDATES

  • SYSTEM BY SYSTEM EVENT LOG ANALYSIS

  • EXTERNAL SECURITY VULNERABILITIES

Network Security

  • DETECT SYSTEM PROTOCOL LEAKAGE

  • DETECT UNRESTRICTED PROTOCOLS

  • DETECT USER CONTROLS

  • DETECT WIRELESS ACCESS

  • EXTERNAL SECURITY VULNERABILITIES

  • NETWORK SHARE PERMISSIONS

  • DOMAIN SECURITY POLICY

  • LOCAL SECURITY POLICY

Analysis Discovery Tasks

Request Your Analysis