The planned activities will include lots of analysis. In preparation for an assessment, the following documentation will need to be gathered for review:
A technical point of contact will need to be available for a full day and key stakeholders available for the first hour. During a one (1) hour presentation with all stakeholders, the process will be shared and any questions answered.
The initial visit will most likely involve a full day of support to gather information. The technical point of contact needs to be available to provide access to routers, switches, servers and workstations.
Following the information gathering, we will coordinate an agreed upon time to return to connect scanners to your network to gather information. Depending on the size of your network, it could take a considerable amount of time for the data to be pulled. The scan is not intrusive and no downtime will be needed. The scanner may need to be left onsite for a number of days to pull the needed information.
Once, the scan is complete and the information is evaluated, we will develop a written report of the security findings outlining the district network security status and recommendations. The information will be provided in an executive summary and a detailed report format.
Areas covered in the report will include:
We will coordinate to determine timelines for corrections and continue to follow up with your district until all corrections are complete.
Copyright © 1985 - 2017. All rights reserved.