Cyber Security Assessment Tool (CSAT)

Provide a holistic view of the cybersecurity position together with fact-based recommendations based on an internationally recognized cybersecurity framework with the short time effort required

Schedule a free demo

Strategic Advantage

Position your offerings as strategic business decisions.

Insightful

Provide your clients with the insights they need

What is the Cyber Security Assessment Tool?

How secure is your customer’s IT infrastructure? Especially now that many organizations have been affected by ransomware, DDoS attacks, and phishing emails, it’s more important than ever to check how effective your customer’s cybersecurity is before you are held accountable for the consequences. Ideally, this should be done on a regular basis because cyber attack techniques and malware are continually evolving. Also, one wrong mouse click can have huge consequences, without your customer even being aware of it. A regular assessment using the Cyber Security Assessment Tool (CSAT) from QS Solutions quickly provides you with insights into potential cyber risks and helps you and your customer decide how and where to improve security measures.

The Cybersecurity assessment scans the entire company infrastructure, including Microsoft 365, Azure, AWS, and Google Workspace, for potential vulnerabilities.

You scan, among other things, the patch management for devices and whether Windows has been configured correctly. You also check administrative privileges and external users in Microsoft 365, Teams, and SharePoint. This is how the assessment accurately identifies the vulnerabilities in your customer’s security.

The Cyber Security Assessment Tool comes complete with a clear plan to improve cybersecurity in your customer’s organization, exactly where it’s needed. It includes clear-cut technical and organizational measures as well as embedded TCO calculations, so that you can keep your customer informed and prepared, leading to fast and smart decisions where you, as a trusted partner, have the opportunity to guide and assist your customer on the journey towards cloud and cybersecurity resilience.

How does CSAT work?

The CSAT is a software product developed by experienced security professionals. It collects relevant security data from different sources in the hybrid IT environment. The CSAT is using dissolvable agents which delete themselves following the endpoint scan. The effort required from the internal IT department is kept to a minimum.

 

Endpoint scan

CSAT collects information about e.g. local accounts, firewall rules, applications installed, the OS/Service Pack, AV status and the registry from the Windows OS and Linux endpoints in your IT hybrid environment.

Active Directory, Azure Active Directory and Intune

The CSAT retrieves User and Group information, identifies external users and (unused) accounts (including admin accounts) and flags suspicious accounts. Furthermore, CSAT will discover registered mobile devices from Intune and reports on compliance policies and recommended practices.

 

Microsoft 365, SharePoint, Teams and Azure

The CSAT searches through content in Micsosoft 365, SharePoint and Teams for Personally Identifiable Information (PII). Access granted to Teams, SharePoint sites and documents is also extracted. By checking the list of external uses, you can quickly identify unauthorized access. Furthermore, the CSAT pulls information from the Azure environment to provide recommendations to tighten the securtiy of the Microsoft tenant.

Create your cyber security roadmap in 3 steps

1.  Intake and installation

  • Check endpoint and network acces
  • Installation CSAT on a (virtual) machine
  • Configuration of CSAT scans
  • 2. Data collection

  • Scan a representative sample of endpoints (servers & workstations)
  • Scan Active Directory and Azure Active Directory
  • Scan the Microsoft 365 and Azure tenant
  • Retreive information of the Email DNS (SPF, DKIM, DMARC)
  • Answer questionnaire on policies, procedures and organizational controls
  • 3. Reports and presentations

  • Analyze the collected data
  • Prioritize recommendations and create an action plan
  • Presentation and discussion of findings, conclusions and recommendations
  • Create Cyber Security Roadmap based on facts