Overview
Uncover IT Risks. Shore up your defenses.
Kickdrum meticulously analyzes and evaluates your IT environment, uncovering any concerning exposures and recommending an action plan to mitigate risk.
What to Expect
Do you have a clear understanding of your organization's IT operations? Kickdrum investigates all relevant tech materials and documentation, conducts interviews and workshops with key IT leaders, builds a detailed analysis of your current IT state, and creates an easily digestible report prioritizing risks by business impact.
How It Works
Kickdrum’s IT Key Risks Assessment is achieved through a four step process:
- Request and review relevant technology materials and documentation.
- Conduct interviews or workshops with Target IT leadership to understand the current state of IT strategy, infrastructure, workforce, policies, and operations.
- Synthesize the stakeholder technical reviews, research, and workshops/interviews to provide insight into strengths, weaknesses, opportunities, and risks within IT operations.
- Prioritize risks by business impact and suggested timeframe for remediation.
What You Learn
Whether evaluating deal risk or looking for key risks that could impact your business, Kickdrum evaluates the following aspects of your business:
- IT organization and security operation center
- Back-office, business, productivity applicationss
- Identity and Access Management (IAM)
- IT operations and help desk
- IT and security policies and procedures
- IT infrastructure, tools, asset management
- Mobile devices and endpoint security
- Employee permissions and data export
- Company backups and locations
- Physical security at company facilities
Highlights
- A key risk assessment outlining key findings from infrastructure and process reviews, including presecriptive recommendations to remedy and relative priority.
- Completed in 3-4 weeks with interviews of key resources reviewing processes and SOPs along with review of documentation and infrastructure review.
- Recommendations to improve resiliency, recovery, infrastructure security, physical security, permissions and access management. Recommendations may include IAM role and user changes, Control Tower policies, VPC Configuration, and other AWS configuration changes.
Details
Pricing
Custom pricing options
How can we make this page better?
Legal
Content disclaimer
Resources
Vendor resources
Support
Vendor support
We provide a report with summary and detailed explanations of IT process, policy, and implementation risks. Our team of security and infrastructure experts will prioritize recommendations to improve your overall IT SOPs.
To get started, contact aws-marketplace-sales@kickdrum.com