Cyber Security Assessment Tool
Improve your security based on facts
Organisations are looking for a way to check their security status quickly and simply. They want insight into their vulnerabilities, based on data from the company infrastructure, Microsoft 365 and Azure. The Cyber Security Assessment Tool (CSAT) from QS solutions provides this through automated scans and analyses. This is the basis on which the CSAT provides recommendations and an action plan to improve your security. It’s the perfect way to maximize security and demonstrate that your organisation takes security seriously.

Improve your security based on facts
What is CSAT?
The Cyber Security Assessment Tool (CSAT) is a software product developed by seasoned security experts to quickly assess the current status of your organizations security and recommend improvements based on facts. The tool collects relevant security data from the hybrid IT environment by scanning e.g. endpoints, Active Directory, Microsoft 365 and Azure. Additionally, CSAT uses a questionnaire to collect data about organizational controls, policies and other key indicators.
Download the CSAT datasheet
Define your Cyber Security Roadmap
Gain insight into your security status. The CSAT provides this insight through automated scans and analyses. This data provides the basis for you to define priorities and gives you the input you need for a roadmap to improve security.

Insight into the ‘Technology Gap’
The CSAT shows which technological and procedural measures you can take to improve security. The CSAT searches through content in Office 365, Teams, and SharePoint for Personally Identifiable Information (PII). Access granted to SharePoint sites, Teams and documents is also extracted.

Recommendations
The CSAT will identify area’s requiring attention and recommend action to be taken. For example, if the CSAT discovers that sensitive information is being shared with persons outside the organisation, it will provide a recommendation for document security. By doing periodical assessments you can proactively improve security.
CSAT provided us quick insight on the current status of the security estate, so we were able to improve security based on real vulnerabilities.
CEO iDealogicCSAT helped us show to our clients that the security of their systems matters to us.
CEO Cow HillsCSAT has confirmed many things are properly configured and arranged. It has also shown some possible improvements. We have created an actionplan on how to improve them.
Manager ICT MarenteHow does it work?
The CSAT is a software product developed by experienced security professionals. It collects relevant security data from different sources in the hybrid IT environment. The CSAT is using dissolvable agents which delete themselves following the endpoint scan. The effort required from the internal IT department is kept to a minimum.

Endpoint scan
CSAT collects information about e.g. local accounts, firewall rules, applications installed, the OS/Service Pack, AV status and the registry from the Windows OS and Linux endpoints in your IT hybrid environment.

Active Directory, Azure Active Directory and Intune
The CSAT retrieves User and Group information, identifies external users and (unused) accounts (including admin accounts) and flags suspicious accounts. Furthermore, CSAT will discover registered mobile devices from Intune and reports on compliance policies and recommended practices.

Microsoft 365, SharePoint, Teams and Azure
The CSAT searches through content in Micsosoft 365, SharePoint and Teams for Personally Identifiable Information (PII). Access granted to Teams, SharePoint sites and documents is also extracted. By checking the list of external uses, you can quickly identify unauthorized access. Furthermore, the CSAT pulls information from the Azure environment to provide recommendations to tighten the securtiy of the Microsoft tenant.
Create your cyber security roadmap in 4 steps
1. Intake and installation
- Check endpoint and network access
- Installation CSAT on a (Virtual) Machine
- Configuration of CSAT scans
2. Data collection
- Scan a representative sample of endpoints (servers & workstations)
- Scan Active Directory and Azure Active Directory
- Scan the Microsoft 365 and Azure tenant
- Retreive information of the Email DNS (SPF, DKIM, DMARC)
- Answer questionnaire on policies, procedures and organizational controls
3. Reporting and recommendations
- Analyze the collected data
- Prioritize recommendations and create an action plan
4. Presentation of Results
- Presentation and discussion of findings, conclusions and recommendations
- Create Cyber Security Roadmap based on facts
Customers we are proud of



