Discover Hidden Threats with our Cyber Threat Assessment

Measure the current state of security, productivity and utilisation with no risk.

Assess the health of your network. Today!

Are you concerned that your current security infrastructure may not accurately detect today’s sophisticated attacks? Do you have the operational visibility to understand how applications (traditional and web-based) are truly being utilised on your network? Is your current security solution able to sustain present-day throughput demands despite increased traffic volume (perhaps due to cloud based storage, big data analytics or increased web usage)?

If you are asking any of these questions, the Cyber Threat Assessment Program is for you! 

Sign-up for the free assessment

Free offer only for South Australian businesses

Get Your Assessment

Security and Threat Prevention - 2

Security and Threat Prevention 

How effective is your current network security solution? Learn more about application vulnerabilities are attacking your network, which malware/botnets were detected and even pinpoint “at risk” devices within your network. 

Productivity-1

User Productivity

How are applications and web resources used within your network? Discover how cloud-based IaaS/SaaS, peer to peer, gaming, and other application subcategories are being utilised within your network. Verify that usage of your traditional client-server and web-based applications are operating in accordance with your corporate use policies. 

Utilisation-1

Network Utilisation and Performance

How should your network security solution be optimised for performance? Find out more about your throughput, session and bandwidth requirements during peak hours. Ensure your security solution is sized and optimised properly based on your actual usage. 

What will be in the assessment report

Subnet CTAP report

The detailed assessment report of your organisation's network infrastructure will include, but not limited to:

  • Application vulnerabilities observed
  • Malware/ botnet detected in the network
  • Devices that are at-risk within the network
  • Various application categories and cloud usage
  • Total number of peer-to-peer, proxy, and remote access applications leveraging your network
  • Web-based applications being accessed and browsing habits
  • Analysis of enterprise bandwidth usage and top consumers
  • Average log rates / sessions for sizing
  • SSL utilisation and encryption impact

How it Works

Without disrupting your existing network, we will monitor your internal traffic for a week. At the end of the collection period, we'll generate a report detailing all of the threats bypassing your existing security controls.

SIGN-UP TODAY