Technology Assessment

Quote Provided

Looking for an independent assessment of your institution’s cybersecurity posture?
AdvantageCIO can provide an in-depth review of your network, systems and technologies deployed.

Out of stock



We review the following areas as part of each assessment:

  • Network design/configuration
  • Active Directory deployment
  • Data classification, storage and sharing
  • Backup and business continuity
  • Logging, monitoring, alerting and reporting
  • Remote and mobile access
  • Email and messaging systems
  • VoIP/Telephony
  • Policies, procedures and documentation
  • Physical security controls

We don’t just hand you scan results, we also review system policies, device configurations, lifecycle considerations, policy/documentation versus practice and rate it all against industry/security best practices.

The process:

  • Scoping, statement of work, approval and initial information request
  • Internal and external vulnerability assessment.
  • Onsite assessment, inventory, configuration reviews, physical control review.
  • Draft report delivery to client, review session to explain findings and high, medium and low priority recommendations.
  • Report finalized, delivered.


Technology Assessments generally take 60-90 days from start to finish, however this can depend on several factors, including client size/complexity, resource availability, etc.

Next Steps:

Email and setup a time for an introductory call to discuss our approach to the Technology Assessment in more detail as well as answer any questions you have. Following the introductory call, AdvantageCIO will provide a detailed statement of work.

Search this service on AnswerBook


There are no reviews yet.

Be the first to review “Technology Assessment”

Your email address will not be published. Required fields are marked *