Improve your security based on facts
Define your Cyber Security Roadmap
Gain insight into your security status. The CSAT provides this insight through automated scans and analyses. This data provides the basis for you to define priorities and gives you the input you need for a roadmap to improve security.
Insight into the ‘Technology Gap’
Legal regulations always involve both organisational processes and technology. The CSAT will define which technical measures you can take to comply with the requirements of GDPR and AVG. You can also use the CSAT to scan the measures taken on a regular basis to determine whether these have been effective. (GDPR Art. 32).
The CSAT will identify area’s requiring attention and recommend action to be taken. For example, if the CSAT discovers that sensitive information is being shared with persons outside the organisation, it will provide a recommendation for document security.
How does it work?
The CSAT is a software product developed by experienced security experts. It collects relevant data by:
- Scanning all endpoints and other systems in the network
- Scanning the Active Directory and Azure AD
- Scanning content in Office 365, SharePoint and fileshares
- Collecting relevant information through an automated survey
By using agents which delete themselves following the endpoint scan, the effort required from the internal IT department is kept to a minimum.
The CSAT is available from 1,250 euros for a annual subscription with as many scans as you want. Want to know more? Download our datasheet.
The CSAT modules
CSAT collects information about accounts, firewall rules, applications installed, the OS/Service Pack, shares and the registry.
Active Directory & Azure Active Directory
The CSAT retrieves User and Group information, identifies external users and (unused) accounts (including admin accounts) and flags suspicious accounts based on different rules and logic.
Office 365, SharePoint and Fileshares
The CSAT searches through content in Office 365, SharePoint & Fileshares for Personally Identifiable Information (PII). Access granted to SharePoint sites and documents is also extracted. This is then compared with the accounts in the Active Directory to identify unauthorised access.
Malware discovery on endpoints
Malware which has breached your organisation’s defences and has installed itself in your network is hunted down by the CSAT. The CSAT does this by using the functionality of Infocyte during the scan. This requires additional licencing.
Want to find out how the CSAT could help your organisation?
Let's get in touch
Roeland van den Berg
+31 (0) 6 10600162
Email Roeland van den Berg