Send me a Quote

Identify all your assets including software applications


INA - INTERNAL NETWORK ASSESSMENT

 

Provides Complete Security Assessment Scanning on all Computers and network devices inside of your company network.  The good guy side!
 Requires on-site service to implement.
(Custom quote.)
 

NETWORK AUDIT TOOL (PDF sample report)  Password
Basic system info 
Provides:
Hardware Audit 
Operating System Audit 
Application Software Audit 
Detail of Report  
Pricing

 

 



Hardware Auditing:

Identifies unique assets logged in to the network giving model types and manufacturers, CPU speeds with color coded speed warning category that tells that a current CPU may not support new software technologies because the minimum CPU speed is too slow, and therefore may not be able to be upgraded.  Another category indicates current technology CPU's that may be considered unsupportable in 12-24 months.  The BIOS (Basic Input/Output System) is identified because it is recommended to update system BIOS whenever possible to help reduce unknown system crashes and improve overall Input/Output performance.  System Disk Size, available free space and network drives are also identified.

BACK

 

 

 

 

 

 

 

 

 

 

 

Operating System Auditing:

Identifies all operating systems (OS) in use on the network.  Based on the OS that was packaged with the hardware purchase and/or the site license information on file you can determine your exposure to unlicensed units, what OS the majority is using (Windows XX) as well as all variations of OS's (Windows 95, 98, NT4, W2k, XP).  For ease and uniformity of technical support and security it is recommended that Windows 95 users be upgraded to Windows 2000 or Windows XP as soon as possible.  Identifying the OS also identifies the users that are currently running old revisions of software.  These Service Packs are available at no cost and should be implemented as soon as possible.  Memory usage and Free disk space on each OS identified is another benefit to identify which systems to run disk clean-up, scan disk and defragmentation utilities on.  

BACK

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Application Software Auditing:

Prevents MAJOR EXPOSURE to license infringement:
Identifies all application software installed on the audited assets.  Applications that are installed on 5 or more assets are typically ASSUMED to have site licenses because this would be the least expensive method to distribute.  Applications with only 1 or 2 occurrences are ASSUMED to be either a single user license or packaged software application installed by the end user.  Anything that does not fall into the SITE or Single User is UNKNOWN and the location of the REQUIRED license will need to be researched. 
Application name, version and serial number are recorded with hot links to the Vendor License Requirements.

BACK

 

 

 

 

 

 

 

 

 

 

 

NOW YOU WILL KNOW-MAKE INFORMED TECHNOLOGY DECISIONS

Each asset is detailed individually with:
Asset NAME, 
User NAME, 
user ID, 
Network Address, 
System Type, 
System Serial, 
Category (Desktop), 
CPU Speed, 
BIOS, 
BIOS update availability, 
Memory Size, 
System Disk and Size, 
Available Free Space, 
Network Drives and logical paths, 
Application Name, 
Serial Number and 
link to vendor License Requirements.

 

 

 

 

 

 

 

 

 
CALL FOR A QUOTE
Pricing starts at $5,000.00
 
NETWORK AUDIT TOOL - In-depth system info
Registry Auditing Tool
Pricing starts at $7,500.00