Organisations are looking for a way to check their security status quickly and simply. They want insight into their vulnerabilities, based on data from the company infrastructure and Office 365. The Cyber Security Assessment Tool (CSAT) from QS solutions provides this through automated scans and analyses. This is the basis on which the CSAT provides recommendations and an action plan to improve your security. It’s the perfect way to maximize security and demonstrate that your organisation takes security seriously.
Improve your security based on facts
What is CSAT?
The Cyber Security Assessment Tool (CSAT) is a software product developed by experienced security experts to quickly assess the current status of your organizations security and recommend improvements based on facts. The tool collects relevant security data from the hybrid IT environment by scanning e.g. endpoints, Active Directory and Office 365. Additionally, CSAT uses a questionnaire to collect data about policies and other key indicators.Download the CSAT datasheet
Define your Cyber Security Roadmap
Gain insight into your security status. The CSAT provides this insight through automated scans and analyses. This data provides the basis for you to define priorities and gives you the input you need for a roadmap to improve security.
Insight into the ‘Technology Gap’
The CSAT shows which technological and procedural measures you can take to improve security. The CSAT searches through content in Office 365 and SharePoint for Personally Identifiable Information (PII). Access granted to SharePoint sites and documents is also extracted. This is then compared with the accounts in the Active Directory to identify unauthorised access.
The CSAT will identify area’s requiring attention and recommend action to be taken. For example, if the CSAT discovers that sensitive information is being shared with persons outside the organisation, it will provide a recommendation for document security. By doing periodical assessments you can proactively improve security.
CSAT provided us quick insight on the current status of the security estate, so we were able to improve security based on real vulnerabilities.CEO iDealogic
CSAT helped us show to our clients that the security of their systems matters to us.CEO Cow Hills
CSAT has confirmed many things are properly configured and arranged. It has also shown some possible improvements. We have created an actionplan on how to improve them.Manager ICT Marente
How does it work?
The CSAT is a software product developed by experienced security experts. It collects relevant security data from different sources in the hybrid IT environment. The CSAT is using agents which delete themselves following the endpoint scan, the effort required from the internal IT department is kept to a minimum.
CSAT collects information about local accounts, firewall rules, applications installed, the OS/Service Pack, shares and the registry from the Windows OS endpoints in your IT environment.
Active Directory, Azure Active Directory and Intune
The CSAT retrieves User and Group information, identifies external users and (unused) accounts (including admin accounts) and flags suspicious accounts. Furthermore, CSAT will discover registered mobile devices from Intune and reports on policies and recommended practices.
Office 365, SharePoint and Teams
The CSAT searches through content in Office 365, SharePoint and Teams for Personally Identifiable Information (PII). Access granted to Teams, SharePoint sites and documents is also extracted. By checking the list of external uses, you can quickly identify unauthorized access. Furthermore, the CSAT pulls the Office 365 Secure Score to provide additional recommendations on the tenant’s security.
Create your cyber security roadmap in 4 steps
1. Intake and installation
- Check endpoint and network access
- Installation CSAT on a (Virtual) Machine
- Configuration of CSAT scans
2. Data collection
- Scan endpoints
- Scan Active Directory and Azure Active Directory
- Scan Office 365, SharePoint sites and Intune
- Answer questionnaire
3. Reporting and recommendations
- Analyze the collected data
- Prioritize recommendations and create an action plan
4. Presentation of Results
- Presentation and discussion of findings, conclusions and recommendations
- Create Cyber Security Roadmap based on facts