Taking the "Secrecy" out of Security

Today's cyber attacks are succeeding far too frequently, all due to the limitations of legacy security tools. Because many security technologies arose in an earlier era—when attacks targeting sensitive information were fairly straightforward to identify—these tools fail when they cannot recognize a previously unknown attack or threat vector.

By performing regular security health checks with MTG, you can help your organization protect its assets, guard against downtime, and sleep better at night. To get your assessment simply fill out the form on the right and a representative from MTG IT Professionals will contact you.

Your IT Security Assessment will include of the following:

  1. Security Risk Report. This executive-level report includes a proprietary Security Risk Score along with summary charts, graphs and an explanation of the risks found in the security scans.
  2. Security Policy Assessment Report. A detailed review of the security policies that are in place on both a domain wide and local machine basis.
  3. Shared Permission Report. Comprehensive lists of all network “shares” by computer, detailing which users and groups have access to which devices and files, and what level of access they have.
    User Permissions Report. Organizes permissions by user, showing all shared computers and files to which they have access.
  4. Internal Vulnerabilities Report. Highlights deviation from industry standards compared to outbound port and protocol accessibility, lists available wireless networks as part of a wireless security survey, and provides information on Internet content accessibility.
  5. External Vulnerabilities Full Detail Report. A comprehensive output including security holes, warnings, and informational items that can help you make better network security decisions, plus a full NMap Scan which checks all 65,535 ports and reports which are open. This is an essential item for many standard security compliance reports.
  6. External Vulnerabilities Full Detail Report. A comprehensive output including security holes, warnings, and informational items that can help you make better network security decisions, plus a full NMap Scan which checks all 65,535 ports and reports which are open. This is an essential item for many standard security compliance reports.