Improve your security based on facts
Define your Cyber Security Roadmap
Gain insight into your security status. The CSAT provides this insight through automated scans and analyses. This data provides the basis for you to define priorities and gives you the input you need for a roadmap to improve security.
Insight into the ‘Technology Gap’
Legal regulations always involve both organisational processes and technology. The CSAT will define which technical measures you can take to comply with the requirements of GDPR. You can also use the CSAT to scan the measures taken on a regular basis to determine whether these have been effective. (GDPR Art. 32).
The CSAT will identify area’s requiring attention and recommend action to be taken. For example, if the CSAT discovers that sensitive information is being shared with persons outside the organisation, it will provide a recommendation for document security.
How does it work?
The CSAT is a software product developed by experienced security experts. It collects relevant data by:
- Scanning all endpoints and other systems in the network
- Scanning the Active Directory and Azure AD
- Scanning Office 365, SharePoint Online, Teams and Intune
- Collecting relevant information through with a questionnaire
By using agents which delete themselves following the endpoint scan, the effort required from the internal IT department is kept to a minimum.
The CSAT is available via our world wide partner channel. Looking for a local partner, check out our partner list on the product website.
The CSAT modules
CSAT collects information about accounts, firewall rules, applications installed, the OS/Service Pack, shares and the registry.
Active Directory & Azure Active Directory
The CSAT retrieves User and Group information, identifies external users and (unused) accounts (including admin accounts) and flags suspicious accounts based on different rules and logic.
Office 365, SharePoint and Intune
The CSAT searches through content in Office 365, SharePoint and Teams for Personally Identifiable Information (PII). Access granted to Teams and SharePoint sites and documents is also extracted. Additionally the registered devices and defined compliance policies are retrieved from Intune and compared to recommended practices.
To assess the organisation’s policies and procedures around security, the CSAT uses a questionnaire. With the technical details from the scans and the answers to the questions, the CSAT provides a reliable maturity status. This is the basis to define next actions.
Want to find out how the CSAT could help your organisation?Download the CSAT datasheet
Let's get in touch
Roeland van den Berg
+31 (0) 6 10600162
Email Roeland van den Berg