Get Protected

Knowledge is power right? Well, our Security Assessment Services give you the power to protect your business.

Get Access to Cybersecurity Engineers that provide you the details that matter. Cerdant’s suite of Security Assessment Services provide expert review of vital security infrastructure, risk visibility and actionable recommendations to mitigate risk.

Get ProtectedLearn More

Assessment 

Most businesses don’t have the time, expertise or staff to truly analyze their current network design against industry best practices. Much less perform consistent assessments of all the devices that could be a potential risk to their network security. Cerdant’s Security Assessment Services provide you multiple options to fit both your needs and your budget.

Get ProtectedLearn More

1: The evaluation or estimation of the nature, quality, or ability of something

noun

As-sess-ment | /əˈsesmənt/

If good things come in three’s...

Organizations' security boundaries have grown to include cloud infrastructure, virtual environments, mobile devices, and IOT, and with this growth has come increased risk. With some of the most experienced Network Security Engineers in the Industry, we believe in being proactive, not reactive. With our Security Assessment Services we help you get ahead of the problem.

We believe in relationships, not transactions. Which is why we have customers for years, not months.

At Cerdant, our mission is simple, we provide our clients with the tightest security posture, highest performing and highest available IT networks, period. We have been in business since 2001 and actively protect over 10,000 network connections

Get Started

99%

- Gartner

of firewall breaches are configuration related and not due to flaws in the devices themselves

99.9%

of vulnerabilities exploited in attacks were compromised more than a year after being published.

- Verizon Data Breach Report

Let's talk about which assessment package best fits your needs. 

Take the first step towards reducing your stress and improving the health of your network today!

Then great things must come in fours.

Four Assessment Packages:

Risk Assessment

A normal business firewall will experience dozens of configuration changes per year. Rarely are these changes examined by a security professional before being made. Cerdant over the past 18+ years has become experts in all things firewalls and networking. We use this extensive knowledge to review, analyze & make recommendations about the current state of your firewall configuration. 

First and foremost, Cerdant looks at your configuration through a security-minded lens. Cerdant can and will make recommendations about network optimizations. It is our goal to make sure that your firewall and network are performing in the most secure manner but with top-notch performance as well.

Assessment Includes:

Data Collection
Interview
Examination
Evaluation
Findings Report
Remediation Recommendations 

Vulnerability Assessment

External vulnerability scanning isn't just for checking a compliance box. Holes in externally facing systems and network infrastructure are an all too common point of entry into networks in all business verticals for cybercriminals. 

Our Vulnerability Assessment service takes security review beyond the firewall to scan your perimeter for threats like remote file inclusion, cross-site scripting, SQL injection and a variety of other application and network-based security gaps.  We will provide a detailed report on where vulnerabilities exist, as well as remediation recommendations. 

Assessment Includes:

External Vulnerability Scan
Examination
Evaluation
Findings Report
Remediation Recommendations 

Penetration Test

It is important to know where security weaknesses lie and the steps to take to correct them, but Cerdant's Penetration Testing Service provides an even more granular level of visibility. By attempting to compromise identified weaknesses and access restricted data, Cerdant's Certified Penetration Testing Professionals are able to simulate attacks under a variety of conditions giving your organization full visibility into what extent your systems and information are at risk.

Test Includes:

External Vulnerability Scan
Examination
Evaluation
Exploit Vulnerabilities
Findings Report
Remediation Recommendations

Phishing Awareness Assessment

Email phishing is one of the most common and most successful attack methods used by cybercriminals; that is why regular employee education and knowledge evaluation is essential. 

Cerdant empowers organizations to regularly assess their employee's ability to properly identify and report phishing emails through monthly or quarterly simulated phishing campaigns. 

Enrollment in training is also an option for those who don't pass their phish-test. These regular assessments will allow you to exponentially reduce your largest attack surface, your end-users.

Assessment Includes:

Data Collection
Interview
Campaign Design
Reporting
Training