Assessments

Developed by the National Institute of Science and Technology (NIST), the Cyber Security Framework (CSF)
provides flexible guidance for evaluating the unique risks that organizations face. Using simplified terms, the assessment helps us align your business practices, security processes and technologies together. Ensuring that your company is utilizing its security budget efficiently and effectively.

Click Here for more details

Gain actionable insight on your corporate security footprint with a high-level review of your company’s overall
security posture. Aimed at helping you identify areas of concern in your IT ecosystem, our team uses industry best practices to investigate and assess your environment for security gaps and issues across more than 50 parameters, resulting in a detailed report of our findings and recommendations

Click Here for more details

The perimeter firewall is often the last bastion of security in a network.  It servees a key role in maintaining visibility into attacks from the outide world.  Is your firewall properly configured?  Do you have rules that are too permissive, and leave giant gaps in your security?  Let us help you find out with our Firewall Health Check Assessment.  We will:

Audit Firewall Rules & Configuration against best practice
Audit Firmware versions for known vulnerabilities
Audit Hardware
Review security settings
Review VPN settings

Need us to validate other systems in your environment?  Our security team is capable of analyzing many different security products for efficacy, best practices, and overall health.   We have many other health checks that we can perform:

MDM/Intune

O365/Azure

AV/EDR

SPAM Filtering

SPF/DKIM/DMARC

Network Infrastructure

 

Not on the list?  Call us and ask.

Managed Services

Consulting Services

Consultation and Remediation

Understanding the current threat landscape is an important aspect of information security. Correcting any detected risks and issues is what truly makes you feel safe. With over 20 years of experience remediating security risks, ITW’s Professional Services team has the knowledge to keep hackers and data thieves away from your business data.

Our Security consulting services include:

 
  • Security Essentials
  • Antivirus and Anti-malware reviews and deployments
  • Firewall audits and rule modifications
  • Licensing reviews
  • Security policy creation
  • Security hardening
  • Physical security audit
  • Network security enhancements
  • User awareness training
  • Anti-Spam deployments
  • Compliance and audit preparation
  • Risk Management Assessments

Security Bundles

Security Essentials

The only way to improve security is to find out exactly where your problems areas are.

Security Essentials is a comprehensive security awareness solution that provides meaningful discovery and insight for every facet of your security program. With Security Essentials, you will know exactly where your security gaps are, while also having access to our team of security experts who can help you understand, prioritize, and remediate any issues.

What’s Included?

Annual Password Enumeration

Our team will perform an offline attack
on your user accounts and let you
know how many unsafe passwords you
have in your environment and which
password best practices are not being
followed.

Dark Web Monitoring

We use advanced tools to monitor the
dark web for compromised credentials
associated with your company. We
alert you immediately if anything is
compromised, before they are used for
identity theft, data breaches or other
crimes.

Awareness Training & Testing

Get customized security training
programs for your team. Games, videos
and self-paced learning will keep your
team informed. We also conduct biannual
testing with simulated phishing
attack emails – helping you measure
your risk and the impact of training.

Monthly Vulnerability Scans

You will receive an external network
vulnerability scan every month to
determine any risk areas and help
you prioritize any remediation tasks.
Enhanced Mail Security
Using cutting edge tools, your email
identity is protected and get reports on
malicious actors sending mail as YOU.

Managed Security Starter Kit

want to improve your security stance? not sure where to start?
Security Operations Center (SOC)
Trust our team of security experts to deliver 24/7 protection for your systems and critical business data. Backed by sophisticated monitoring and analysis tools, our team of experts will alert you to any suspicious or malicious network activity. In addition, regular reporting will aid your decision making and increase the overall level of visibility into your environment.
Security Information and Event Management
Our SIEM collects, monitors, and assesses data from your critical business assets across multiple platforms in order to identify patterns and spot critical events as they occur in real time.
Vulnerability Management
Most hackers access systems due to poorly patched or configured apps. With quarterly scheduled  assessments we will ensure software patches are up to date and you are safe from known security vulnerabilities.
Annual Penetration Test
Checking the external facing IP addresses for vulnerabilities, and injection points for hackers are an essential part of keeping your IT environment secure. Annual testing will make sure that no new devices have been added, or forgotten devices are not providing a jumping point for hackers to invade your network. 
Firewall Management
Ease the burden of dealing with your complex security devices on your own. IT Weapons will configure and manage your existing firewalls, ensuring proper protection and event logging is in place. Don’t have a proper firewall or threat management solution? High-performance hardware-as-a-service devices are available.
Scroll to Top