• Inventory of Hardware and Software Assets
    We perform a complete hardware and software inventory using our automated agent, and provide the results for your review.
  • Continuous Vulnerability Management
    We are constantly scanning your network for vulnerabilities. We notify your IT staff, or we generate work orders for our technicians to patch or apply compensating controls to keep you safe.
  • Controlled use of administrative privileges
    We ensure that your administrative accounts are safeguarded against misuse. We ensure that account reviews are performed on an annual basis.
  • Secure configuration for hardware and software on mobile devices, laptops, workstations and servers
    We harden the systems we manage to ensure they are setup with a standard configuration using benchmarks such as CIS.
  • Maintenance, Monitoring and Analysis of Audit Logs
    We monitor the audit logs of the systems we manage to ensure the health of the systems as well as potentials threats from malicious actors that could be probing your network or systems.