FOUNDATIONAL
OPERATIONAL
PROACTIVE
The Foundational Look considers the core security measures that are the building blocks to an overall risk management plan
The Operational Look score takes into account security measures that dynamic growing companies should focus on to increase their security posture
The Proactive Look considers more advanced security considerations geared at forward thinking organizations that are actively preparing for future security threats
EisnerAmper's proprietary tool is used to assess your company's technology and financial risk, and provide a roadmap for cyber success.
FiR$T Look focuses on three categories of risk:
Customized to industry and firm size
Nationally recognized NIST framework
Individualized technology roadmap for IT/Finance
Easy graphical display of IT security risk
Proprietary EisnerAmper methodology
• Updated Operating Systems
• Outbound Internet Filtering
• Inbound Internet Filtering
• Wireless Access Security
• Spam Filtering
• Mobile Device Management
• Next Generation Firewall
• Desktop Security
• Hardware Inventory
• Software Inventory
• Multi Factor Passwords
• VPN Authentication
• Email Phising
• Corporate Credential Theft
• Risk Assessments
• Administrative Access
• Log Management
• Disaster Recovery
• Vulnerability Scans
• IOT Device Security
• Payments Compliance
• Website Security
• Incident Response Plan
•Cyber Policy
These are areas that are essential to having the basics of a security strategy:
Foundational
As a business is running these are the next group of areas to be thinking of:
Operational
Forward thinking, a business should embrace these areas:
Proactive
Every gap in your IT security puts millions of company dollars at risk
• Spam Filtering
• Mobile Device Management
• Next Generation Firewall
• Desktop Security
• Hardware Inventory
• Software Inventory
• Multi Factor Passwords
• VPN Authentication
• Email Phising
• Corporate Credential Theft
• Risk Assessments
• Administrative Access
• Log Management
• Disaster Recovery
• Vulnerability Scans
• IOT Device Security
• Payments Compliance
• Website Security
• Incident Response Plan
•Cyber Policy