Health Check Assessment

Identify your Security Score Strengths and Weaknesses

Arrange Call Back Build your SOC

What is your security score?

Digicel Business Protect Health Check Assessment delivers your security score strengths and weaknesses with actionable recommendations to improve your overall security posture. We benchmark and evaluate each customers Network/Domain looking to protect and enhance the ability to respond to any type of security breach. Chat with one of our security advisors to understand how the Health Check Assessment can help you reduce risk, minimize breach impact, and protect against future attacks.

Digicel Business Protect Health Check Reports

The following assessment delivers industry standard reports to evaluate and action.

Security Risk Report
This report includes a proprietary Security Risk Score and chart showing the relative health (on a scale of 1 to 10) of the network security, along with a summary of the number of computers with issues. This powerful lead generation and sales development tool also reports on outbound protocols, System Control protocols, User Access Controls, as well as an external vulnerabilities summary list.
Security Management Plan This report will help prioritize issues based on the issue's risk score. A listing of all security related risks are provided along with recommended actions.
Consolidated Security Report Card The Consolidated Security Report Card assesses individual computers at a high level based on various security criteria. Devices discovered on the network are assigned an overall score, as well as a specific score for each of the assessment categories detailed in the report card. The scores are represented as color-coded letter grades ('A' through 'F'). The report card provides a relative measure as to how well a computer complies with security best practices.
Client Progress Report The Progress Report allows MSPs to showcase the value of their service offerings to their clients. Information is delivered through easy-to-follow charts that illustrate the continuous improvements to the client’s security profile and can validate the need for additional resources. MSPs can customize the documents by including or excluding sections, changing text, and adding boilerplates. The Progress Report is available for users with subscriptions to the Network Assessment Module, the Security Assessment Module, and Reporter.
Security PowerPoint Use our generated PowerPoint presentation as a basis for conducting a meeting presenting your findings from the Network Detective. General summary information along with the risk and issue score are presented along with specific issue recommendations and next steps.
External Vulnerabilities Scan Detail Report A comprehensive output including security holes and warnings, informational items that can help make better network security decisions. This is an essential item for many standard security compliance reports.
External Vulnerability Scan Detail by Issue Report A more compact version of the External Vulnerability Scan Detail report that is organized by issues. Devices that are affected are listed within an issue. This report is useful for technicians that are looking to resolve issues, rather than performing remediation on a particular system.
External Network Vulnerabilities Summary Report This report provides a priority ordered listing of issues by CVSS that allows technicians to prioritize the issues they are working on. It provides an extremely compact view of all issues allow a quick survey of the various issues that were detected in an environment.
Outbound Security Report Highlights deviation from industry standards compared to outbound port and protocol accessibility, lists available wireless networks as part of a wireless security survey, and provides information on Internet content accessibility.
Security Policy Assessment Report A detailed overview of the security policies which are in place on both a domain wide and local machine basis.
Share Permission Report by Computer Comprehensive lists of all network "shares" by computer, detailing which users and groups have access to which devices and files, and what level of access they have.
Share Permission Report by User Organizes permissions by user, showing all shared computers and files to which they have access.
User Behavior Analysis Report Shows all logins, successful and failure, by user. Report allows you to find service accounts which are not properly configured (and thus failing to login) as well as users who may be attempting (and possibly succeeding) in accessing resources (computers) which they should not be.
Login History by Computer Report Same data as User Behavior but inverted to show you by computer. Quite useful, in particular, for looking at a commonly accessed machines (file server, domain controller, etc.) – or a particularly sensitive machine for failed login attempts. An example would be CEO's laptop – or the accounting computer where you want to be extra diligent in checking for users trying to get in.
Login Failures by Computer Report Report identifies users who have succeeded in logging in to another machine. Great for auditing/logging purposes to know of all attempts.
Data Breach Liability Report Identifies specific and detailed instances of personal identifiable information (PII) and cardholder data throughout a computer network that could be the target of hackers and malicious insiders. It also calculates the potential monetary liability and exposure based upon industry published research.
RSOP Computer Settings Report This report analyzes the various Resulting Sets of Policy (RSOP) based on computer policy settings on computers in the environment and can be used to assess how many variants of settings exist in a network. Small variants might be a result of misconfiguration of misapplication of Group Policies at the computer level. Use this report to demonstrate how you might be able to create consistent policies or avoid one-off settings and misconfigurations that lead to inconsistent security policy application.
RSOP User Settings Report This report analyzes the various Resulting Sets of Policy (RSOP) based on user policy settings on computers in the environment and can be used to assess how many variants of settings exist in a network. Small variants might be a result of misconfiguration of misapplication of Group Policies at the user level. Use this report to demonstrate how you might be able to create consistent policies or avoid one-off settings and misconfigurations that lead to inconsistent security policy application.

Get Started with Digicel Business Protect

Contact our Team

Contact our Team