Listing Thumbnail

    IT Diligence Key Risks Assessment

     Info
    Sold by: Kickdrum 
    Kickdrum IT Key Risks Assessments uncover vulnerabilities hidden within your IT strategy, infrastructure, workforce, policies, and operations
    Listing Thumbnail

    IT Diligence Key Risks Assessment

     Info
    Sold by: Kickdrum 

    Overview

    Uncover IT Risks. Shore up your defenses.

    Kickdrum meticulously analyzes and evaluates your IT environment, uncovering any concerning exposures and recommending an action plan to mitigate risk.

    What to Expect

    Do you have a clear understanding of your organization's IT operations? Kickdrum investigates all relevant tech materials and documentation, conducts interviews and workshops with key IT leaders, builds a detailed analysis of your current IT state, and creates an easily digestible report prioritizing risks by business impact.

    How It Works

    Kickdrum’s IT Key Risks Assessment is achieved through a four step process:

    • Request and review relevant technology materials and documentation.
    • Conduct interviews or workshops with Target IT leadership to understand the current state of IT strategy, infrastructure, workforce, policies, and operations.
    • Synthesize the stakeholder technical reviews, research, and workshops/interviews to provide insight into strengths, weaknesses, opportunities, and risks within IT operations.
    • Prioritize risks by business impact and suggested timeframe for remediation.

    What You Learn

    Whether evaluating deal risk or looking for key risks that could impact your business, Kickdrum evaluates the following aspects of your business:

    • IT organization and security operation center
    • Back-office, business, productivity applicationss
    • Identity and Access Management (IAM)
    • IT operations and help desk
    • IT and security policies and procedures
    • IT infrastructure, tools, asset management
    • Mobile devices and endpoint security
    • Employee permissions and data export
    • Company backups and locations
    • Physical security at company facilities

    Highlights

    • A key risk assessment outlining key findings from infrastructure and process reviews, including presecriptive recommendations to remedy and relative priority.
    • Completed in 3-4 weeks with interviews of key resources reviewing processes and SOPs along with review of documentation and infrastructure review.
    • Recommendations to improve resiliency, recovery, infrastructure security, physical security, permissions and access management. Recommendations may include IAM role and user changes, Control Tower policies, VPC Configuration, and other AWS configuration changes.

    Details

    Sold by

    Delivery method

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Support

    Vendor support

    We provide a report with summary and detailed explanations of IT process, policy, and implementation risks. Our team of security and infrastructure experts will prioritize recommendations to improve your overall IT SOPs.

    To get started, contact aws-marketplace-sales@kickdrum.com