Security Assessments and Audits


Assessments and audits can not only identify open technical vulnerabilities, but also managerial and operational vulnerabilities.  In addition to network and system scanning, which can identify a large number of technical and operational vulnerabilities, interviews and observation provide insight into how the system is actually operated – this exposes weaknesses that management may be completely unaware of.  Once identified, these vulnerabilities will be thoroughly documented in our assessment or audit report so that they may be appropriately addressed and remediated in order to return the system to a secure posture in compliance with agency or company policy.

The stages of an assessment or audit are outlined below:

  • Network and System Vulnerability Scanning
  • Manual Review of Security Controls
  • Security Documentation and Policy Review
  • Interviews and Observations
  • Penetration Testing –  highly recommended

Contact Us

Let's talk about the best solution for you because that's the only one that matters.

Get in Touch

Join Us

Get a feeling for our company culture and picture yourself at Blue Mantle.

View Open Positions