• Twitter
  • LinkedIn
  • 1-855-877-7655
  • info@rsolutions.com
rSolutions
  • Home
  • About Us
  • Cybersecurity
    • Managed Cybersecurity Services
    • Professional Cybersecurity Services
    • Sales & Licensing
  • Partners
  • Blog
  • Get in Touch
  • Search
  • Menu Menu

Security-based Health Check

Reviews the security configuration of systems like network devices, servers, mainframes and endpoint devices.

Health checks compare the deployed build against vendor guidelines and the industry’s best methods for securing the device.

Typical activities in this test include:

  • Assessing the vulnerabilities of the device.
  • Reviewing the configuration and security baseline to assess if best security practices have been adhered to by vendor and security.
  • Reviewing installed services and removing unnecessary ones.
  • Reviewing the build process, change in management, or any other relevant processes that control the creation and updating of the device, application and software.
  • Assessing the risk of identified vulnerabilities.
  • Prioritizing the vulnerabilities and providing solutions where possible.

Latest News

  • Seven things to consider in Cyber SecurityJanuary 21, 2021 - 10:34 am
  • Filling the Cyber Security Skills GapJune 17, 2017 - 1:51 pm
  • Cybersecurity – Which security tasks and roles can be outsourced?April 19, 2017 - 10:08 am
  • Splunk – A one field game changerMarch 14, 2017 - 9:16 am

Skip to Section

March 2021
M T W T F S S
1234567
891011121314
15161718192021
22232425262728
293031  
« Jan    
rSolutions CorporationVisibility Drives Action
Logo image
Follow Us
Computer & Network Security • Regina, Saskatchewan • 300+ followers

Who We Are

  • About rSolutions
  • Our Partners
  • Our Blog
  • Contact Us

What We Do

  • Professional Services
  • Managed Security
  • Sales & Licensing
  • FireEye Threat Protection
  • Fortinet Security
  • Splunk Data Intel

What’s New?

January 21, 2021

Seven things to consider in Cyber Security

June 17, 2017

Filling the Cyber Security Skills Gap

April 19, 2017

Cybersecurity – Which security tasks and roles can be outsourced?

Link to: Get in Touch
  • Vancouver
  • Edmonton
  • Calgary
  • Regina
  • Winnipeg
  • Toronto
  • Ottawa
  • Halifax
© rSolutions | Made with ♥ by Strategy Lab
  • Twitter
  • LinkedIn
  • Home
  • About
  • Services
  • Partners
  • Blog
  • Contact
  • Staff Login
Network and Firewall Configuration Review Internal Active Directory Health Check Scroll to top