ASSESSMENT COMPLETED!

Thank you for completing the high-level assessment.

We hope you find this information helpful in improving the security posture of your technology environment. If you have any questions, please contact us.

IT governance sets the foundation for an enterprise’s IT security posture. It requires an IT steering committee; IT policies, procedures, standards, and guidelines; and performance measures and metrics.
BACK to assessment
Wide and metropolitan area networks (WANs and MANs) are used by organizations with multiple remote physical locations requiring direct connections to the core enterprise network. This section focuses on security measures and controls around WANs and MANs.
BACK to assessment
All organizations have an Internet presence, Internet access, and third-party connections, for example, to cloud providers and strategic partners. This section focuses on the security and controls surrounding an organization’s Internet presence.
BACK to assessment
Every organization with Internet access has an Internet service provider (ISP) and a firewall (ideally, a next-generation model) to protect IT assets from external threats. This section provides important security measures and controls related to the ISP and the Internet-facing firewall.
BACK to assessment
Many organizations use web applications to interact with customers. As such, web applications are a critical component of the overall technology security posture. This section focuses on basic web-application security controls.
BACK to assessment
In this section, we evaluate your internal network security posture with questions about core router and WiFi configurations. Properly configuring the core router and wireless controller is critical to a secure internal computing environment.
BACK to assessment
The final section of the assessment focuses on enterprise applications and network storage. These questions provide insight into the effectiveness of your data security measures.
BACK to assessment
The typical enterprise network has a directory service technology, such as Active Directory, a network access control (NAC) solution, and an access-layer switch with defined user VLANs. This section provides security measures and controls related to Active Directory, NAC, and access-layer switching.
BACK to assessment