Proprietary Technology

When we start working together, we will visit your primary place of business and run a scan on your network and computers, using a proprietary, fast, completely non-invasive device, we call the ‘Black Box System’. This systems allows us to collect useful information about everything connected to the network, and overall condition of the environment. Unlike any other IT companies, there are no agents, probes or software to install and when it’s done, it leaves no “trace” of your activity, no conflicts with other applications, no firewall issues, and nothing to remember to uninstall.

This Black Box System will:

  • Compare multiple data points to uncover hard to detect issues, measure risk based on impact to the network, suggest recommended fixes, and track remediation progress.
  • Analyze external vulnerability, user behavior, permissions, logins, and more.
  • Create the necessary worksheets, interview forms, documentation and step-by-step controls to make sure your compliance program meets all necessary requirements.
  • Provide deep dive analytics including Layer 2/3 scans for super-detailed network diagrams and reporting as well as comprehensive internal vulnerabilities scans. 

After generating the report – which takes less than 15 minutes –  we email a copy to you and review our findings with you.  Our reports are simple, easy to understand, and clearly show what needs to be addressed.  After discussing the recommended problems and solutions, we will do our part and you do yours.  Future scans can be done remotely at any time to insure that any issues have been addressed.