Cybersecurity Assessment for Your Windows Environment

Discover if sensitive information is being shared with persons outside of your organization

Mitigate Your Security Vulnerabilities

The Cybersecurity Assessment (CSAT) scans your endpoints, provides recommendations and a customized action plan to improve system-wide security. Gain insight into your security status through automated scans and analysis.

Assessment to Action Plan

Intake & Installation

  • Check endpoint and network access
  • Install CSAT on a (Virtual) Machine
  • Configuration CSAT

Scanning

  • Scan endpoints
  • Scan Active Directory and Azure
  • Scan Office 365, SharePoint online (for quick and full scan) and on-premises (for full scan) and Intune

Reporting, Recommendations & Results

  • Answer some questions
  • We analyze the data collected
  • The results are presented in a report
  • We discuss findings and recommendations

Quick Scan Pricing Guide

For a full scan, contact us for more information and pricing.

Below 50 Endpoints

$2,500
  • Scan all your endpoints, including laptops, desktops, active directory
  • Recommendations and an action plan to improve security
  • Detailed results of the scanned environments
  • Licensing status (consumed, prepaid, available)
  • Includes 2 hours of security consulting
  • Company Rating – maturity score based on CISv7 standards

51 - 100 Endpoints

$4,000
  • Scan all your endpoints, including laptops, desktops, active directory
  • Recommendations and an action plan to improve security
  • Detailed results of the scanned environments
  • Licensing status (consumed, prepaid, available)
  • Includes 4 hours of security consulting
  • Company Rating – maturity score based on CISv7 standards

101 - 300 Endpoints

$6,000
  • Scan all your endpoints, including laptops, desktops, active directory
  • Recommendations and an action plan to improve security
  • Detailed results of the scanned environments
  • Licensing status (consumed, prepaid, available)
  • Includes 8 hours of security consulting
  • Company Rating – maturity score based on CISv7 standards

The pricing above are for quick scans on your environment for up to 300 endpoints. Please contact us if you have an environment requiring more than 300 endpoints. Quick scans entail scanning your cloud applications, including devices, active directory and servers. Full scans include everything that is included in quick scans, as well as SharePoint (on-premises), Simple Network Management Protocol (SNMP) and SSH. For a full scan, please contact us for more information and pricing.

Leaked Credentials

See how Microsoft Security can detect and help protect your organization from leaked credentials. When cybercriminals compromise valid passwords of legitimate users, they often share those credentials. This risk detection type indicates that the user’s valid credentials have been leaked.

Learn More

Phishing Attacks

Phishing attacks are scams that often use social engineering bait or lure content. Legitimate-looking communications, usually email, that link to a phishing site is a common form of ransomware attack–the top cyber crime impacting businesses today.

Learn More

Microsoft Security Workshop

Join us at our upcoming Microsoft Security Workshop to learn about the current threat challenges facing organizations, and the tools to efficiently mitigate and protect your sensitive and critical data.

Learn More