Skip to main content
Rehmann
Rehmann
Solutions
Industries
Resources
About Us

Information Technology Assessments

We can perform Information Technology Assessments to test the effectiveness of your controls or assess your existing IT environment and provide recommendations for improvement.  We assess the security environment against industry standards, including policies, security, access control, data integrity, continuity plans, and more to help you better understand your IT landscape and how it can be further strengthened. Get a comprehensive evaluation of your environment that covers:

  • Information Security Program
  • Logical Access Processes
  • Access Review Processes
  • Access Administration Processes
  • Password Policy
  • Network Architecture
  • Security Log Monitoring
  • Endpoint Detection and Response
  • Mobile Device Administration Processes
  • Backup Processes
  • Physical Security
  • Change/Patch Management
  • Contingency Planning/Disaster Recovery

Vulnerability Assessments and Penetration Testing

Our vulnerability professionals identify security risks associated with your systems — and create strategies to eliminate them. We perform reconnaissance on your environment, scan for vulnerabilities, and simulate actual attacks to help identify potential security weaknesses through external, internal, and wireless vulnerability and penetration, and web application tests.

Social engineering tests that assess susceptibility

Is your organization security aware? Our multifaceted social engineering tests will tell you. We use email, phone, and in-person efforts to determine your vulnerabilities.

Control framework assessments that provide a clear picture

We assist clients by assessing their cybersecurity controls against independent third-party frameworks such as:

NIST Cybersecurity Framework (CSF)

Ideal framework for small and medium-sized businesses that provide a good foundational set of basic “cyber hygiene” controls, which organizations can expand on as they mature

CMMC / NIST 800-171

Framework is intended for organizations that provide government services or products. Clients that hold “Controlled Unclassified Information” are required to comply with CMMC / NIST 800-171

Center for Internet Security (CIS) Top 18

We can facilitate management’s self-assessment against the CIS’s recommended security controls.

Network Health Review

The Network Health Review is a comprehensive on-site and virtual assessment of your IT environment. It helps you understand the health of your IT environment with certainty. Even better, you’ll get to speak to an expert about it, so you have full clarity. Our Network Health Review covers the physical and technical wellness of your infrastructure, including:

  • Server room(s)
  • Network scanning
  • Storage (SAN/NAS)
  • Servers (physical and virtual)
  • Backup and data protection
  • Network Infrastructure
  • Messaging and collaboration
  • Remote access
  • Business continuity/disaster recovery
  • Ongoing maintenance/patching
  • Monitoring

We’ll study the environment, and you’ll receive a 360° Assessment Analysis, Scanning Tool Analysis, and a Notes/Observations Report. Then a Rehmann Solutions Manager will walk you through the data and answer your questions. From Understanding to Impact After your Network Health Review, you’ll better understand your organization’s IT strengths and have a targeted, impactful improvement plan.

360° Assessment Tool

Rehmann offers a 360° Assessment Tool to help organizations understand where they stand when it comes to their IT environment.

If you’re the technical resource managing IT for your organization take this 10-15 minute assessment below.

Upon completion, one of our technology professionals will connect within 1-2 business days to provide an assessment report which includes a result map and best practices scorecard, and discuss any potential risk areas.

Get Started

If you aren’t the technical resource, but you oversee the technical resource managing IT for your organization, request a 30-60 minute appointment with one of our technology professionals who will connect and schedule a time to work through the assessment with you.

Once the assessment is completed, a report will be generated which includes a result map and best practices scorecard, and your Rehmann representative will review the results and discuss any potential risk areas.

Request an appointment

We’re here to help.

Just send us a note and we’ll do our best to get back to you as quickly as possible.

Jessica R. Dore, CISA

Principal, Risk Advisory Services

989.799.9580

"*" indicates required fields