Cyber Security Assessment
Improve your security based on facts
Organisations are looking for a way to check their security status quickly and simply. They want insight into their vulnerabilities, based on data from the company infrastructure and Office 365. The Cyber Security Assessment Tool (CSAT) from QS solutions provides this through automated scans and analyses. This is the basis on which the CSAT provides recommendations and an action plan to improve your security. It’s the perfect way to maximise security and demonstrate that your organisation takes security seriously.
What is CSAT?
The Cyber Security Assessment Tool (CSAT) is a software product developed by experienced security experts to quickly assess the current status of your organisations security and recommend improvements based on facts. The tool collects relevant security data from the hybrid IT environment by scanning e.g. endpoints, Active Directory and Office 365. Additionally, CSAT uses a questionnaire to collect data about policies and other key indicators.
Define your Cyber Security Roadmap
Gain insight into your security status. The CSAT provides this insight through automated scans and analyses. This data provides the basis for you to define priorities and gives you the input you need for a roadmap to improve security.
Insight into the Technology Gap
The CSAT shows which technological and procedural measures you can take to improve security. The CSAT searches through content in Office 365 and SharePoint for Personally Identifiable Information (PII). Access granted to SharePoint sites and documents is also extracted. This is then compared with the accounts in the Active Directory to identify unauthorised access.
Recommendations
The CSAT will identify area’s requiring attention and recommend action to be taken. For example, if the CSAT discovers that sensitive information is being shared with persons outside the organisation, it will provide a recommendation for document security. By doing periodical assessments you can proactively improve security.
How does it work?
The CSAT is a software product developed by experienced security experts. It collects relevant security data from different sources in the hybrid IT environment. The CSAT is using agents which delete themselves following the endpoint scan, the effort required from the internal IT department is kept to a minimum.
Endpoint scan
CSAT collects information about local accounts, firewall rules, applications installed, the OS/Service Pack, shares and the registry from the Windows OS endpoints in your IT environment.
Active Directory, Azure Active Directory and Intune
The CSAT retrieves User and Group information, identifies external users and (unused) accounts (including admin accounts) and flags suspicious accounts. Furthermore, CSAT will discover registered mobile devices from Intune and reports on policies and recommended practices.
Office 365, SharePoint and Teams
The CSAT searches through content in Office 365, SharePoint and Teams for Personally Identifiable Information (PII). Access granted to Teams, SharePoint sites and documents is also extracted. By checking the list of external uses, you can quickly identify unauthorized access. Furthermore, the CSAT pulls the Office 365 Secure Score to provide additional recommendations on the tenant’s security.
Create your cyber security roadmap in 4 steps
Intake & Installation
-
Check endpoint and network access
-
Installation CSAT on a (Virtual) Machine
-
Configuration of CSAT scans
Data Collection
-
Scan endpoints
-
Scan Active Directory and Azure Active Directory
-
Scan Office 365, Sharepoint sites and Intune
-
Answer questionnaire
Reporting & Recommendations
-
Analyse the collected data
-
Prioritise recommendations
-
Create action plan
Presentation of Results
-
Presentation and discussion of findings, conclusion and recommendations
-
Create Cyber Security Roadmap based on facts