For a limited time we are offering a completely free, no obligation IT assessment with detailed reports. This will give you much greater insight into how your systems are performing and any risks you may be facing.

If you would like to arrange a free IT assessment...

Chat with us


or call us on 0117 370 0050


Once completed, we will provide you with the following list of reports

Client Risk Report

The report will present you with a summary of your overall risk score based on our scan, along with simple charts to show the problem areas. This report could be used by any IT specialist to clearly resolve what could be potentially serious issues with your network. More detialed information on the items in this report and how we came to our findings will be avilable in our Full Network Report.

Network Management Plan

This report will help prioritize issues based on the issue's risk score. A listing of all affected computers, users, or sub-systems are provided along with recommended actions.

Full Detail Network Report

Our scan will pull out literally hundreds of pages of end-user network activity and configuration data. The Full Network Assessment Report includes every detail, presented in line-item fashion in an editable report document. The report is organized by section with a table of contents to help you locate the specific findings of interest, and problem areas are conveniently highlighted in red, making it easy to spot individual problems to be rectified.

Site Diagram

The schematic shows the basic network structure, with convenient drill downs into each group of like workstations. Each device is annotated with important identifying configuration information and is color-coded based on its status.

Asset Detail Report

The report is ideal for cataloging and documenting the complete settings and configurations for individual workstations and servers.

BDR Needs Analysis Report

This report presents an analysis of the Backup/Disaster Recovery needs for an environment. The report includes both discovered information regarding the storage needs of an environment along with analysis of both onsite and offsite backup requirements.

Security Risk Report

This report includes a proprietary Security Risk Score and chart showing the relative health (on a scale of 1 to 10) of the network security, along with a summary of the number of computers with issues. It also reports on outbound protocols, System Control protocols, User Access Controls, as well as an external vulnerabilities summary list.

SQL Server Detail Report

This report details the settings and health of the SQL Server as a whole. It looks at settings, configuration, performance, and backup. Information and detailed breakdown of databases can be found in the Database Detail report.

PCI Policies & Procedures Document

The Policy and Procedures are the best practices that our industry experts have formulated to comply with the technical requirements of the PCI DSS. The policies spell out what your organization will do while the procedures detail how you will do it. In the event of a PCI Compliance audit, the first things an auditor will inspect are the Policies and Procedures documentation. This is more than a suggested way of doing business. The Policies and Procedures have been carefully thought out and vetted, referencing specific sections in the PCI DSS Requirements and supported by the other reports include with the PCI Compliance module.