Organisations are looking for a way to check their security status quickly and simply. They want insight into their vulnerabilities, based on data from the company infrastructure and Office 365. The Cyber Security Assessment Tool (CSAT) from QS solutions provides this through automated scans and analyses. This is the basis on which the CSAT provides recommendations and an action plan to improve your security. It’s the perfect way to maximise security and demonstrate that your organisation takes security seriously. This is also important given the GDPR regulations.
Improve your security based on facts
What is CSAT?
The Cyber Security Assessment Tool (CSAT) is a software product developed by experienced security experts to quickly assess the current status of your organisations security and recommend improvements based on facts. The tool collects relevant data from the IT environment by scanning e.g. endpoints, Active Directory and SharePoint. Additionally, CSAT uses a questionnaire to collect data about policies and other key indicators.Download the CSAT datasheet
Define your Cyber Security Roadmap
Gain insight into your security status. The CSAT provides this insight through automated scans and analyses. This data provides the basis for you to define priorities and gives you the input you need for a roadmap to improve security.
Insight into the ‘Technology Gap’
The CSAT searches through content in Office 365 and SharePoint for Personally Identifiable Information (PII). Access granted to SharePoint sites and documents is also extracted. This is then compared with the accounts in the Active Directory to identify unauthorised access. (GDPR Art. 32).
The CSAT will identify area’s requiring attention and recommend action to be taken. For example, if the CSAT discovers that sensitive information is being shared with persons outside the organisation, it will provide a recommendation for document security.
CSAT provided us quick insight on the current status of the security estate, so we were able to improve security based on real vulnerabilities.CEO iDealogic
CSAT helped us show to our clients that the security of their systems matters to us.CEO Cow Hills
CSAT has confirmed many things are properly configured and arranged. It has also shown some possible improvements. We have created an actionplan on how to improve them.Manager ICT Marente
How does it work?
The CSAT is a software product developed by experienced security experts. It collects relevant security data from different sources in the hybrid IT environment. The CSAT is using agents which delete themselves following the endpoint scan, the effort required from the internal IT department is kept to a minimum.
CSAT collects information about local accounts, firewall rules, applications installed, the OS/Service Pack, shares and the registry from the Windows OS endpoints in your IT environment.
Active Directory, Azure Active Directory and Intune
The CSAT retrieves User and Group information, identifies external users and (unused) accounts (including admin accounts) and flags suspicious accounts. Furthermore, CSAT will discover registered mobile devices from Intune and report on policies and recommended practices.
Office 365 and SharePoint
The CSAT searches through content in Office 365 and SharePoint for Personally Identifiable Information (PII). Access granted to SharePoint sites and documents is also extracted. This is then compared with the accounts in the Active Directory to identify unauthorised access.
Create your cyber security roadmap in 4 steps
1. Intake and installation
- Check endpoint and network access
- Installation CSAT on a (Virtual) Machine
- Configuration CSAT
- Scan endpoints
- Scan Active Directory and Azure Active Directory
- Scan Office 365, SharePoint sites and Intune
3. Reporting and recommendations
- Answer questionnaire
- Analyse the collected data
- The results are presented in a report
4. Presentation of Results
- Presentation and discussion of findings, conclusions and recommendations
- Create Cyber Security Roadmap based on facts