top of page
Satisnet GA Service White.png

Research

Analyse

Report

Plan

Satisnet's Gap Analysis Service enables you to focus your cyber security resources. Identify gaps and weaknesses, and implement a plan to ensure you security controls are working for your organisation.
​
Ensure your security controls and processes are up to speed, all while prioritising resources, improving cyber maturity, and focusing risk.


CIS Top 20

  • Gap analysis service based on the Center for Internet Security's (CIS) Top 20 Security Controls

​

CIS20 Controls.png

Satisnet's Gap Analysis Service - Why?

  • Understand your current security maturity vs. where you'd like to be

​

  • Identify the cyber security risks to your organisation

​

  • Prioritise and objectively plan the closure of any risks exposed

​

  • Benchmark your security processes and performance

​

  • Have a clear plan and focus for your budget

​

Ultimately, improve your security protocols!

IDENTIFY WEAKNESSES

Reports White.png

An assessment of your organisations' tooling and processes is critical to stay ahead of the changing threat landscape.

GAP ANALYSIS SERVICE ||| DELIVERABLES

CYBER SECURITY REPORT

The Service is centred around your organisations' Cyber Security Report. The report is the output of a security assessment, and provides and overall review of your cyber security program and practices.

It will measure your security maturity using a tailored questionnaire and by various automated scans of security-related data.

It will identify security weaknesses within your organisation.

Reports_edited.png

ACTION PLAN

Rules_edited.png

Your security improvement initiative based on:

​

  • Review of existing security controls, processes and tools

  • Vulnerability scans and reports from existing tooling

  • Detailed security posture report

  • Report on recommended remediation steps

  • Roadmap and proposal report

YOUR SERVICE

  • Typically a 5-day consultancy

  • Detection of weak domain passwords

  • Discovery of legacy/stale privileged accounts

  • Uncovering of key assets with exploitable/critical vulnerabilities

  • Assessment of your cloud infrastructure

  • Concise report detailing findings for your internal business use

  • Business remediation steps and recommendations

Business-Context_edited.png

Start your gap analysis journey to security maturity today!

bottom of page