[vc_row][vc_column][vc_column_text]
Technology Assessments play a key role in helping businesses understand how efficient the IT Operations is running inside their business. In today’s world, technology changes at such a rapid pace that it mandates business owners independently validate internal IT departments, outsourced IT vendors, and/or consultants providing IT projects to the business confirming business critical functions are setup and functioning properly.
[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column width=”3/4″][vc_column_text]
We offer many different types of Technology Assessments based on the specific areas you need documented and reported on. All of the assessments we offer include reports, recommendations, and dedicated meetings with you to present the reports and help you plan resolutions so you can achieve your goals.
[/vc_column_text][/vc_column][vc_column width=”1/4″][contact-form-7-popup element_type=”button” display=”Schedule” id=”16566″ box_title=”Thank you for your interest in IT Vizion.”][/vc_column][/vc_row][vc_row][vc_column width=”1/4″][vc_empty_space][block_title style=”column_title” title=”IT Health
Assessment”][/block_title][vc_column_text]
The most popular and broadest assessment we offer includes reports and recommendations on systems, network assets, configurations, and security.
IT Health Assessment includes:
[/vc_column_text][list icon=”moon-arrow-right-2″][list_item title=”Hardware Inventory”][list_item title=”Software Inventory”][list_item title=”Anti-Virus / Anti-Malware Summary”][list_item title=”Microsoft Patch Summary”][list_item title=”Backup and Disaster Recovery Summary”][list_item title=”Network Infrastructure”][list_item title=”Vendor Services Review”][list_item title=”Email Continuity”][list_item title=”Firewall Review”][list_item title=”Remote Access Review”][list_item title=”Active Directory Review”][/list][/vc_column][vc_column width=”1/4″ css=”.vc_custom_1592206402517{background-image: url(https://itvizion.com/wp-content/uploads/2020/06/bg4-1.jpg?id=19293) !important;}”][vc_empty_space][block_title style=”column_title” title=”Application Assessments”][/block_title][vc_column_text]
Each of the modular assessments focuses on a specific platform and includes detailed reports, analysis, and recommendations based on that specific platform.
[/vc_column_text][vc_empty_space][list icon=”moon-arrow-right-2″][list_item style=”titledesc” title=”Network Assessment” desc=”A complete set of reports touch on the broadest range of systems, network assets, settings, configuration, installed applications and endpoint security issues. It also includes a site diagram, and recommendations.”][list_item style=”titledesc” title=”Security Assessment” desc=”A full set of security reports focus on network and user-related security risks, allowing for quick isolation of critical vulnerabilities. The reports reveal which users have access to what systems, and what systems are configured with what permissions. Also includes external vulnerabilities scans and Dark Web password exposure.”][list_item style=”titledesc” title=”Exchange Assessment” desc=”A unique IT assessment tool with specialized and generalized applications.”][list_item style=”titledesc” title=”SQL Server Assessment” desc=”This assessment provides all necessary reports needed for maintaining, monitoring, and reporting the status of any SQL Server database with critical insights into potential threats and gauge overall health of the databases before something critical happens.”][/list][/vc_column][vc_column width=”1/4″][vc_empty_space][block_title style=”column_title” title=”Compliance Assessments”][/block_title][vc_column_text]
Each of the offered compliance assessments performs detailed reviews of either HIPAA or PCI compliance in the business. Each assessment includes detailed reports, risk analysis, and the full documentation required by law.
[/vc_column_text][list icon=”moon-arrow-right-2″][list_item style=”titledesc” title=”HIPAA Compliance / Assessment” desc=”This custom assessment combines automated collection of network data with information collected through observations, photographs and surveys. This assessment module also includes a repository to safely and securely collect all the data, and a HIPAA risk assessment engine that automatically generates required compliance documents including a Policies & Procedures, Risk Analysis, Management Plan, and Evidence of Compliance.”][list_item style=”titledesc” title=”PCI Compliance Assessment” desc=”This assessment combines automated collection of network data with information collected through observations, photographs and surveys. It automatically generates the official documents that comprise a comprehensive PCI data security assessment. This assessment also includes Internal Vulnerabilities Scan and the Layer 2/3 Network Diagram for compliance requirements by law.”][/list][/vc_column][vc_column width=”1/4″ css=”.vc_custom_1592206442469{background-image: url(https://itvizion.com/wp-content/uploads/2020/06/bg4-1.jpg?id=19293) !important;}”][vc_empty_space][block_title style=”column_title” title=”Cloud
Assessments”][/block_title][vc_column_text]
Each of the cloud assessments focuses on data gathering and reporting technology that allows for critical visibility into virtual computing environments.
[/vc_column_text][vc_empty_space][list icon=”moon-arrow-right-2″][list_item style=”titledesc” title=”Microsoft Cloud Assessment” desc=”Analyzes Azure AD and the Microsoft 365 (formerly Office 365) productivity cloud and generates reports to gain insights. Includes Cloud Risk and Cloud Management Reports, a Configuration Change Report, a Cloud Security Report, plus separate assessment reports for the SharePoint, OneDrive and Teams services, plus the Outlook webmail app.”][/list][vc_row_inner][vc_column_inner][vc_empty_space height=”550px”][/vc_column_inner][/vc_row_inner][/vc_column][vc_column][/vc_column][/vc_row]