External Vulnerability Scan
Identifies any vulnerabilities seen from outside your network, i.e: what the hackers see.
Internal Vulnerability Scan
Identifies internal vulnerabilities which might trigger from inside the client network.
Internal Policy Review
Ensures a valid, written Information Security Plan is in place and in practice.
Roadmap to Compliance
With full evaluation completed, a written plan for compliance will be developed detailing steps
to be taken to help ensure compliance and to eliminate risk. This plan is reviewed in a joint staff
with the RNT team, your IT team and operational staff.
This technical assessment defines, identifies and classifies security holes or vulnerabilities in
a computer, network or communication infrastructure.
These assessments follow the vulnerability assessment with an in-depth review of documented
processes and practices which support compliance and minimize vulnerabilities.
These assessments include assessing multiple aspects of an organization such as: mission,
vision, staff, regulatory restrictions, current state and desired/required strategic state.