Thank you for joining the ZAG team at Viva Fresh 2022, and we hope you enjoyed Greg Gatzke’s presentation.
Every year most of us go to the doctor to get a physical. A checkup to ensure we’re healthy. To uncover any unknown issues.
We can do the same for your IT “security posture.” An effective review with actionable outcomes. Less headaches, more sleep.
How Can You Protect Yourself?
- Educate employees
- Enable multi-factor authentication (MFA)
- Strengthen passwords
- Deploy a modern anti-SPAM solution
- Use a modern anti-virus solution
- Regularly patch systems
- Firewall Rules (Zero Trust)
- Umbrella (DNS filtering)
- AD Escalation Alerting
- App Locker
- Snapshot Recoveries
- Disaster Recovery/ Incident Response/ Business Continuity Plans
- Penetration Testing
Review Your Security
ZAG can give you a better picture of your security with everything from rapid turnaround external scans to comprehensive whole network assessments. Contact our team today.
Flexible Review Solutions
You have a range of security review options that are low impact and high ROI. You can start with an external scan to “see what hackers see,” and graduate to a comprehensive internal assessment of your network security posture. Each option includes a conference call with our team, who will present an actionable plan you can carry forward.
External Security Posture Rating Report – 365 Days Coverage
1x 30-minute Initial Findings Consultation
3x 30-minute Quarterly Remediation Reviews
External Vulnerability Scan + Report
Internal Vulnerability Scan + Report
Windows Active Directory Report
Executive Review + Action Plan
Monthly Vulnerability Scans
Monthly Vulnerability Review Consultation
Dark Web Report
Monitored Remediation Action Plan
Additional Review Options
Advanced Breach Detection
Weekly scans to detect malicious activity that anti-virus software cannot.
Vendor Risk Identification & Prioritization
Discover and prioritize critical vendors affecting supply chain operations.
Compliance management for HIPAA, NIST CSF, CMMC, GDPR, and cyber insurance.
Custom Scheduled 1:1 Consultations
Customized network security consultations, analysis, and remediation recommendations.
SEcurity Controls Report
Assess the effectiveness of physical, admin, and internal and external security controls.
Business Continuity & Disaster Recovery Planning
Creation and implementation of business continuity and disaster recovery plans.