Security Assessment

Understand Your Security With Our IT Security Assessment!


With Hostirian’s Security assessment, we’ll give you an in-depth look into your networks and analyze any vulnerabilities that would need to be rectified.  There are too many ways that a network can be compromised to leave it to chance that nothing wrong is going on “behind the scenes.”  Get rid of that secrecy that’s in your business.  A few ways this can happen are as follows:


>> Emailed-based viruses getting through unprotected mailboxes.
>> Worms, viruses and malware infiltrating outbound port/protocol access, backdoors and “command and control”
>> Trojan applications and phishing schemes


In addition to the potential damage to networks and your data, there are other critical business reasons to be tracking and documenting key network security attributes:


>> Bandwidth abuse that can be slowing down critical business applications
>> The downloading of pirated software
>> Employee productivity — ie: wasted by accessing social media networks and other entertainment websites
>> Loss  of proprietary business data and information from the inside


Our non-invasive data collector and analyzer can crunch the data on your network that allows us to produce a baseline set of security reports.  The Hostirian IT Security Assessment can consist of the following elements:


  • Security Risk Report — This executive level report includes a proprietary Security Risk Score and chart showing the relative health (on a scale of 1 to 10) of the network security, along with a summary of the number of computers with issues.
  • Security Policy Assessment Report — A detailed review of the security policies that are in place on both a domain wide and local machine basis.
  • Security Management Plan — This report will help prioritize issues based on the issue’s risk score. A listing of all security related risks are provided along with recommended actions.
  • Computer Security Report Card — The Computer Security Report Card assesses individual computers at a high level based on various security criteria. Devices discovered on the network are assigned an overall score, as well as a specific score for each of the assessment categories detailed in the report card. The scores are represented as color-coded letter grades (‘A’ through ‘F’). The report card provides a relative measure as to how well a computer complies with security best practices.
  • Share Permission Report by Computer — Comprehensive lists of all network “shares” by computer, detailing which users and groups have access to which devices and files, and what level of access they have.
  • Share Permission Report by User — Organizes permissions by user, showing all shared computers and files to which they have access.
  • Outbound Security Report — Highlights deviation from industry standards compared to outbound port and protocol accessibility, lists available wireless networks as part of a wireless security survey, and provides information on Internet content accessibility.
  • External Vulnerabilities Full Detail Report — A comprehensive output including security holes, warnings, and informational items that can help you make better network security decisions, plus a full NMap Scan which checks all 65,535 ports and reports which are open. This is an essential item for many standard security compliance reports.
  • Anomalous User Login Activity — Methodically analyze login history from the security event logs.  The report uses mathematical modeling and proprietary pattern recognition to highlight potential unauthorized users who log into machines they normally do not access and at times they normally do not log in. This report delivers a security professional focus and pinpoints a manageable set of logins to investigate. The alternative is a time-consuming, manual spot check that often misses the mark and is far less reliable.

Installed Security Products Are NOT Enough


There are a number of very effective tools and techniques that can help you address many of the common threats and problems, including firewalls, virus production tools, Internet Content filtering, and more. However, if any of these tools were 100% effective, there would be no security breaches and we know we’re far away from that. As soon as a known threat is addressed by these tools, a new one emerges. There’s not a product out there in the world today that can create security policies for your clients and enforce that those policies are adhered to.


If you’re the one who is responsible for specifying, installing, and/or managing these tools, and the hardware and software are performing perfectly month after month, there’s no guarantee that they’ll be working tomorrow.


That’s why you need Hostirian’s IT Security Assessment for your business.


Fill out our form on the right side of this page to get started!

Scroll to Top