Organisations are looking for a way to check their security status quickly and simply. They want insight into their vulnerabilities, based on data from the company infrastructure and Office 365. The Cyber Security Assessment Tool (CSAT) from QS solutions provides this through automated scans and analyses. This is the basis on which the CSAT provides recommendations and an action plan to improve your security. It’s the perfect way to maximise security and demonstrate that your organisation takes security seriously. This is also important given the GDPR regulations.

CSAT screenshot

Improve your security based on facts

What is CSAT?

The Cyber Security Assessment Tool (CSAT) is a software product developed by experienced security experts to quickly assess the current status of your organisations security and recommend improvements based on facts. The tool collects relevant data from the IT environment by scanning e.g. endpoints, Active Directory and SharePoint. Additionally, CSAT uses a questionnaire to collect data about policies and other key indicators.

Roadmap

Define your Cyber Security Roadmap

Gain insight into your security status. The CSAT provides this insight through automated scans and analyses. This data provides the basis for you to define priorities and gives you the input you need for a roadmap to improve security.

Security gap

Insight into the ‘Technology Gap’

Legal regulations always involve both organisational processes and technology. The CSAT will define which technical measures you can take to comply with the requirements of GDPR and AVG. You can also use the CSAT to scan the measures taken on a regular basis to determine whether these have been effective. (GDPR Art. 32).

Continues improvement

Recommendations

The CSAT will identify area’s requiring attention and recommend action to be taken. For example, if the CSAT discovers that sensitive information is being shared with persons outside the organisation, it will provide a recommendation for document security.

“CSAT provided us quick insight on the current status of the security estate, so we were able to improve security based on real vulnerabilities.”

CEO iDealogic

“CSAT helped us show to our clients that the security of their systems matters to us.”

CEO Cow Hills

“CSAT has confirmed many things are properly configured and arranged. It has also shown some possible improvements. We have created an actionplan on how to improve them.”

Manager ICT Marente

How does it work?

The CSAT is a software product developed by experienced security experts. It collects relevant data by using agents which delete themselves following the endpoint scan, the effort required from the internal IT department is kept to a minimum.

endpoints

Endpoint scan

CSAT collects information about accounts, firewall rules, applications installed, the OS/Service Pack, shares and the registry.

Active Directory

Active Directory & Azure Active Directory

The CSAT retrieves User and Group information, identifies external users and (unused) accounts (including admin accounts) and flags suspicious accounts based on different rules and logic.

Data protection

Office 365, SharePoint and Fileshares

The CSAT searches through content in Office 365, SharePoint & Fileshares for Personally Identifiable Information (PII). Access granted to SharePoint sites and documents is also extracted. This is then compared with the accounts in the Active Directory to identify unauthorised access.

Create your Cyber Security roadmap in 4 steps

1. Intake and installation

Integration

  • Check technical infrastructure
  • Check endpoint and network access
  • Deploy CSAT in Azure
  • Configure CSAT

2. Scanning

Discover

  • Scan endpoints
  • Scan Active Directory and Azure Active Directory
  • Scan Office 365, SharePoint sites and Fileshares
  • Discover malware on endpoints

3. Reporting and recommendations

Report 2

  • Analysis of the collected data
  • The results are presented in a report

4. Presentation of Results

presentation

  • Presentation and discussion of findings, conclusions and recommendations
  • Create Cyber Security Roadmap based on facts

Customers we are proud of

AWVN
Public sector
The Netherlands

AWVN

KH Engineering
Industrial Engineering
The Netherlands

KH engineering

Cow Hills
IT company
The Netherlands

Cow Hills Retail

Marente
Healthcare
The Netherlands

Marente zorggroep

Contact us

QS solutions HQ
Modemweg 38
3821 BS Amersfoort
The Netherlands
+31 33 71 22 111
info@qssolutions.nl

Paul Dols

Paul Dols

CEO