Any security policy must satisfy business objectives as well as the technical aspects of securing a company's informational assets. iON's network security policy development experts review business practices and processes as well as the impact of regulatory guidelines. Based on this assessment, we can develop and document all necessary policies to create a comprehensive security program for your business. Where polices are already in place, iON can perform an in-depth audit to determine the effectiveness of current policy design and implementation.

iON's Current State Assessment (CSA) determines the level of protection a company's current measures, procedures and processes provide against compromise of its informational assets, corporate image or legal liabilities. It also measures the success of an organization's implementation of security. Vulnerability issues include design of the perimeter network (router, firewall, DMZ, etc.), security patches, device configuration, and safeguarding information that may aid unauthorized system access.

Understanding your organization’s security state and identifying vulnerabilities are the first steps toward protecting the confidentiality, integrity and availability of critical data.

  • Evaluates current information security posture
  • Mitigates risk by identifying vulnerabilities before they become a threat
  • Identifies vulnerabilities and determines gaps in the information security environment
  • Helps protect the confidentiality, integrity and availability of critical data
  • Reduces the risk of regulatory non-compliance
  • Ensures adequate protection from outsider threat and helps mitigate internal liabilities
  • Streamlines network security devices and technologies that are wasterful or ineffective
  • Provides confidence that your network security architecture meets industry best practice and customer specific regulatory standards


Contact iON for a Current State Assessment quote and options list.

Current State Assessments