Our Network and Security Assessments are a no obligation exercise in which we analyze your network and in place security for issues or items that need to be addressed to ensure the continuity of your business.


Selecting an I.T. Provider is an important decision. That’s why we don’t expect you to engage our services before gaining a comfort level with our knowledge, experience and expertise. Our trained and certified team will work with you to provide our free network assessment, which includes:

  • Consult key players in your organization to determine what you want to accomplish with your technology
  • Examine existing server and network infrastructure to determine its ability to deliver what you need
  • Examine the security and backup of your network and devices
  • Examine desktops, laptops and peripherals to determine its ability to deliver for your business
  • Explore available on-premise and cloud-based solutions to determine their viability for your unique situation
  • Examine software solutions to determine their fit in your organization
  • Examine the communication methods and work flows of your staff
  • Create a summary document with our findings

What is an IT Assessment?
Southern Data Solutions’ IT assessments will help you obtain an accurate understanding of your organization’s setup, configuration, security, and risk posture, while ensuring information security best practices.

Network Assessment Features & Benefits

Business Features Benefit
Simple to Use NO SOFTWARE OR AGENTS TO INSTALL! Scan an entire network from a single computer! All data collectors run in memory and when done, go away, saving time and eliminating client push-back.
Fast Most scans run quickly while you're on-site or via remote connection. Import the results into the data analyzer and generate branded reports in minutes, not the days that it would "normally" take. Use our scheduling tools to run scans on larger networks during low-demand times.
Unobtrusive/ Not "monitoring" software. Data collector runs in memory
Non-invasive with no changes made to system or network so 100% safe for prospecting. Very small footprint with no detectable performance degradation.
Secure No business data or passwords are gathered or transmitted, and there is no need to modify your firewall settings which could in other situations compromise network or system security. All data collected (with the exception of an External Scan) is 100% local, so you know exactly where your customer's data is at.
Identifies Critical
Gives you the information necessary to confirm client concerns and issues, and uncover new potential issues to close new business and keep competitors out of existing accounts. Find issues others miss with the available Internal and External vulnerabilities scans.
Modular Many different reports available in four separate IT Assessment modules, two different Compliance modules, plus our Inspector software appliance.
Includes a separate scanning tool to use on computers that are not attached to the network, including Macs. Allows for a seamless consolidation of individual off-network computer data back into master network reports.
Best Practice
Deviation Reporting
Highlights in red issues that merit further investigation. For example, an offline domain controller.

How IT Works

Step 1. Run Data Collectors. We run a unique library of proprietary network scanners designed to gather an enormous amount of network, machine and end-user data. Some scanners can be run remotely off of our servers.

Step 2. Collect the Data. You can collect data from any device that’s connected to the network centrally through the Network Scanners. We collect data from stand-alone machines, and machines with different operating systems. We also collect data manually through on-site observations, interviews, and photographs. Collected data is encrypted and automatically saved.

Step 3. Import the Data. Regardless of the source, you can import all the data gathered at a given site and the tool automatically assembles and combines everything into a single data set to give you a fully-integrated set of reports.

Step 4. Generate Your Reports. You can preview the results of your scans using a powerful data browser built into the tool. The reports produced depend on the assessments you subscribe to. Reports are saved in standard MS Office formats, including Word, Excel, and PowerPoint, which you can easily edit.

What to expect

The Network Assessment Module gives you the broadest insights of any IT assessment with reports such as:

  • Client Risk Summary Report - This report presents a summary of their overall risk score based on the scan, along with simple charts to show the problem areas.
  • Full Detail Report - This report is very detailed with end-user network activity and configuration data. It includes every detail, presented in line-item fashion and organized by section with a table of contents to help you locate the specific findings of interest, and problem areas are conveniently highlighted in red, making it easy to spot individual problems to be rectified.
  • Asset Detail Report - This report provides detailed information on each of the individual assets discovered by the scan. The report will  catalog and document the complete settings and configurations for individual workstations and servers.
  • Excel Export Report - This report gives us the ability to output all of the assets and configurations uncovered by our scan, and export it into an Excel file format. Once in Excel, as can manipulate the data, import it into other programs, or simply create custom sorts, analyses, reports and graphs inside of Excel. We could even add columns of new data such as location info, emergency phone numbers, and customer instructions to make this report even more valuable.

The Security Assessment Module provides detailed visibility into your company’s security environment with reports such as:

  • Security Risk Report -  This executive-level report includes a proprietary Security Risk Score along with summary charts, graphs and an explanation of the risks found in the security scans.
  • Security Policy Assessment Report - A detailed review of the security policies that are in place on both a domain wide and local machine basis.
  • Shared Permission Report - Comprehensive lists of all network “shares” by computer, detailing which users and groups have access to which devices and files, and what level of access they have.
  • User Permissions Report - Organizes permissions by user, showing all shared computers and files to which they have access.
  • Outbound Security Report - Highlights deviation from industry standards compared to outbound port and protocol accessibility, lists available wireless networks as part of a wireless security survey, and provides information on Internet content accessibility.
  • External Vulnerabilities Full Detail Report - A comprehensive output including security holes, warnings, and informational items that can help you make better network security decisions, plus a full NMap Scan which checks all 65,535 ports and reports which are open. This is an essential item for many standard security compliance reports.

Why do it?

There are too many ways that a network can be compromised to leave it to chance that nothing wrong is going on "behind the scenes". Key issues:

  • Email-based viruses getting through unprotected mailboxes
  • Worms, viruses and malware infiltrating outbound port/protocol access, backdoors, and "command and control"
  • Trojan applications and phishing schemes

In addition to the potential damage to networks and data, there are other critical business reasons to be tracking and documenting key network security attributes::

  • Employee productivity - wasted by accessing Facebook, ESPN, shopping, porn sites
  • Bandwidth abuse that can be slowing down critical business applications
  • Downloading of pirated software
  • Loss of proprietary business data and information from the inside

There are a number of very effective tools and techniques that can help you address many of the common threats and problems, including firewalls, virus production tools, Internet Content filtering, and more. However, if any of these tools were 100% effective, there would be no security breaches and we know we’re far away from that. As soon as a known threat is addressed by these tools, a new one emerges. There’s not a product out there in the world today that can create security policies for your clients and enforce that those policies are adhered to.

And if you’re the one who is responsible for the security of your company’s data, you absolutely need to make sure that they’re working on a regular basis. Even if the hardware and software are performing perfectly month after month, there’s no guarantee that they’ll be working tomorrow.

That’s why you need a recurring network and  security check-up.

Call Today for your assessment! (678) 872-7380 or email us at Solutions@therightmsp.com