THE DATA BREACH
This scan looks for:
Personal Identifiable Information (PII)
Credit Card information
Social Security numbers
Date of Birth
Automatic clearing house (ACH)
Access permissions and Vulnerabilities
How is risk calculated?
(Data*Avg) x (Permissions)x (Vulnerabilities) = Liability $$
HOW DOES IT WORK?
This scan performs a complete assessment of the applications and operating system to determine any known vulnerabilities that exist and can lead to compromise. SSIT Risk Audit’s vulnerability database is comprehensive across all supported platforms including Microsoft Windows, Mac OSX and Linux as well as Android and Apple iOS.
COMMAND LINE SCANNER
The core scanning technology is a lightweight non-persistent host based executable for Windows, Mac and Linux systems that performs data discovery, vulnerability assessment, file hash discovery, permission discovery and configuration detection.
BROWSER BASED SCANNER
The browser based scanner helps organizations assess 3rd party contractors, employee owned devices or other transient devices that access their networks and applications. It can be integrated into web portals, single sign-on or other access points to catch non persistent devices.
NATIVE MOBILE APPS
For Android and Apple iOS devices, these native mobile apps provide vulnerability assessment and data discovery. It also includes lite MDM (mobile device management) capabilities such as locate, lock and wipe.
COMBINING sensitive data discovery and vulnerability scanning with industry data to determine your breach risk in dollars.
WHY CHOOSE A RISK AUDIT SCAN?
Our Risk Audit Scan might seem complex but it's actually very simple. Depending on the amount of computers you have and how much storage is on them, the scan time can range from 60 seconds to ten minutes. Not too shabby for finding unsafe critical information. In this time the scan will go through thousands of files on your computer and locate exactly where the stored information is.
The Risk Audit Scan is a very precise software system. We understand that identifying the wrong information is a waste of time that no one wants to deal with. Instead of sending you on a wild goose chase to find a problem that's not there, our Risk Audit will only give you the right information without missing anything crucial that other software systems might overlook.
Our Risk Audit Scan is low cost and affordable for any company. We know that every company has some form of sensitive data that has accumulated on the machines over time. Most people don't even know its there. We developed this audit with everyone in mind so no matter the size of your company, there is a cost effective option for you.