

Applications
We will assess the suite of applications in play to determine whether they are integrated with your identity practice. We will also assess the applications your users are using, the risks involved and surrounding governance with our Shadow IT tools.

Data
Where is your data? Is it protected at rest? In transit? Does it meet compliance requirements? We will assess your infrastructure, cloud storage and platforms for security capabilities and align those with best practices.

Users
We will complete discovery on key questions like: What is the secure user experience? Are your users security aware? How many identities are maintained by the organization? How do you administer users in bulk? Do you screen sign-ins and assess risk?

Infra
What does your physical network topology look like? We will assess your sites, routing, switching, firewall, wireless, monitoring and control systems for security best practices. We will test penetration with outside-in access, internal systems and servers for best practices and perform full current state analysis.
