Your request for a Network Security Assessment has been successfully submitted.
A Ticket has been Created. Let's get started.
Now we are ready to begin - This step will take 10 - 15 minutes
Step 1 - Identify the Assets that create, store, or transmit data. Identify the important documents and where they are stored.
The first step is to Identify the Assets that you would like to protect. Organizations typically wish to protect computers, laptops, mobile devices, tablets, servers, databases, and files (documents / spreadsheets). Other items may include websites, custom applications, and intellectual property. Once we identify the assets we will draw a 'security perimeter' around those assets and focus 100% our attention on protecting those assets. Click the button below to begin. A secure form will open in a new window.