top of page

THE DATA BREACH 

RISK SCAN

 

This scan looks for:

  • Personal Identifiable Information (PII) 

  • Credit Card information 

  • Social Security numbers

  • Date of Birth 

  • Automatic clearing house (ACH) 

  • Driver License

  • Access permissions and Vulnerabilities

​

How is risk calculated?

(Data*Avg) x (Permissions)x (Vulnerabilities) = Liability $$

​

 
HOW DOES IT WORK?
​

This scan performs a complete assessment of the applications and operating system to determine any known vulnerabilities that exist and can lead to compromise. SSIT Risk Audit’s vulnerability database is comprehensive across all supported platforms including Microsoft Windows, Mac OSX and Linux as well as Android and Apple iOS.

​

COMMAND LINE SCANNER 

​

The core scanning technology is a lightweight non-persistent host based executable for Windows, Mac and Linux systems that performs data discovery, vulnerability assessment, file hash discovery, permission discovery and configuration detection.

 

BROWSER BASED SCANNER 

​

The browser based scanner helps organizations assess 3rd party contractors, employee owned devices or other transient devices that access their networks and applications. It can be integrated into web portals, single sign-on or other access points to catch non persistent devices.

​

NATIVE MOBILE APPS

​

For Android and Apple iOS devices, these native mobile apps provide vulnerability assessment and data discovery. It also includes lite MDM (mobile device management) capabilities such as locate, lock and wipe.

COMBINING sensitive data discovery and vulnerability scanning with industry data to determine your breach risk in dollars.
 Globe Shield

WHY CHOOSE A RISK AUDIT SCAN?

QUICK

Our Risk Audit Scan might seem complex but it's actually very simple. Depending on the amount of computers you have and how much storage is on them, the scan time can range from 60 seconds to ten minutes. Not too shabby for finding unsafe critical information. In this time the scan will go through thousands of files on your computer and locate exactly where the stored information is.

ACCURATE

The Risk Audit Scan is a very precise software system. We understand that identifying the wrong information is a waste of time that no one wants to deal with. Instead of sending you on a wild goose chase to find a problem that's not there, our Risk Audit will only give you the right information without missing anything crucial that other software systems might overlook.

COST EFFECTIVE

Our Risk Audit Scan is low cost and affordable for any company. We know that every company has some form of sensitive data that has accumulated on the machines over time. Most people don't even know its there. We developed this audit with everyone in mind so no matter the size of your company, there is a cost effective option for you. 

bottom of page