Satisnet GA Service White.png

Research

Analyse

Report

Plan

Satisnet's Gap Analysis Service enables you to focus your cyber security resources. Identify gaps and weaknesses, and implement a plan to ensure you security controls are working for your organisation.

Ensure your security controls and processes are up to speed, all while prioritising resources, improving cyber maturity, and focusing risk.


CIS Top 20

  • Gap analysis service based on the Center for Internet Security's (CIS) Top 20 Security Controls

CIS20 Controls.png

Satisnet's Gap Analysis Service - Why?

  • Understand your current security maturity vs. where you'd like to be

  • Identify the cyber security risks to your organisation

  • Prioritise and objectively plan the closure of any risks exposed

  • Benchmark your security processes and performance

  • Have a clear plan and focus for your budget

Ultimately, improve your security protocols!

IDENTIFY WEAKNESSES

Reports White.png

An assessment of your organisations' tooling and processes is critical to stay ahead of the changing threat landscape.

GAP ANALYSIS SERVICE ||| DELIVERABLES

CYBER SECURITY REPORT

The Service is centred around your organisations' Cyber Security Report. The report is the output of a security assessment, and provides and overall review of your cyber security program and practices.

It will measure your security maturity using a tailored questionnaire and by various automated scans of security-related data.

It will identify security weaknesses within your organisation.

ACTION PLAN

Your security improvement initiative based on:

  • Review of existing security controls, processes and tools

  • Vulnerability scans and reports from existing tooling

  • Detailed security posture report

  • Report on recommended remediation steps

  • Roadmap and proposal report

YOUR SERVICE

  • Typically a 5-day consultancy

  • Detection of weak domain passwords

  • Discovery of legacy/stale privileged accounts

  • Uncovering of key assets with exploitable/critical vulnerabilities

  • Assessment of your cloud infrastructure

  • Concise report detailing findings for your internal business use

  • Business remediation steps and recommendations

Business-Context.png

Start your gap analysis journey to security maturity today!