Paladin IT can perform a wide range of IT assessments including Operational, Security, and HIPAA and PCI Compliance. We also can install dedicated devices that monitor and assess the internal or external threats to your systems and network; each module is designed to produce a unique set of specialized reports for a different type of IT operational area risk.
These assessments are non-intrusive and can take a snapshot of the status of your IT infrastructure and networks. The resulting reports aid us in identifying weaknesses and vulnerabilities in your systems.
Operational IT Assessment and Security Assessment Tools
NETWORK ASSESSMENT MODULE |
Network Detective is our basic assessment tool and comes with a complete set of reports that touches on the broadest range of systems, network assets, settings, configuration, installed applications and endpoint security. Other modules use its reporting capability for more extensive and detailed reports required. |
SECURITY ASSESSMENT MODULE |
Includes a full set of security reports that focuses on network and user-related security risks, and is designed to provide a basic Managed Security Service. This report reveals which users have access to what systems, and what systems are configured with what permissions. This module also includes a powerful integrated external vulnerabilities scan. |
EXCHANGE ASSESSMENT MODULE |
The Microsoft Exchange assessment tool includes a comprehensive scan of the entire MS Exchange or Office 365 platform. It is used for pre-Exchange migration documentation and post Migration validation. It can also be used as an everyday Exchange management tool that can use when supporting our clients Exchange or Office 365 implementations. |
SQL SERVER ASSESSMENT MODULE |
This module aids us in properly manage the networks that have applications running on SQL Server, including SharePoint. The tool allows us to scan and generate all the reports needed for maintaining and reporting the status of any SQL Server database. This can give us the insights to assess potential threats and gauge the overall health of the databases BEFORE something critical goes wrong. |
Compliance Assessment Tools
HIPAA COMPLIANCE MODULE |
This purpose-built module combines automated collection of network data with information collected through observations, photographs and surveys. It’s also the only software that gives you a repository to safely and securely collect all the data, and a built-in HIPAA risk assessment engine that automatically generates the official documents that comprise a comprehensive HIPAA IT assessment. |
PCI COMPLIANCE MODULE |
This module can be used at any network where our clients accept credit cards. Similar in approach to the HIPAA Compliance Module, the PCI tool combines automated collection of network data with information collected through observations, photographs and surveys. It also automatically generates the official documents that comprise a comprehensive PCI data security assessment. In most cases, we will want to use Inspector (see below) to perform the Internal Vulnerabilities Scan and the Layer 2/3 Network Diagram, which are a mandatory requirement of PCI. |
Threat Assessment Tools
Onsite Software on a Dedicated Device
INSPECTOR™ |
Inspector focuses on EXTERNAL threats and performs “deep-dive” diagnostics including layer 2/3 network discovery, login anomaly detection, and internal vulnerability scans. Scans are downloaded into Network Detective where the specialized reports are generated. The software appliance can be downloaded after purchase and installed in a Hyper-V environment, or purchased pre-installed on a small-form server. |
DETECTOR™ |
Detector focuses on INTERNAL threats. Traditional security technologies including firewalls, anti-malware, and anti-spam filters are focused on deterrence and prevention from external causes, even though 70% of security problems originate from internal sources. Detector is the only software appliance that closes this gap through a unique combination of machine learning and intelligent tagging to identify suspicious Anomalies, Changes and Threats (ACT). |