Cyber Risk Assessment
Get visibility in into your environment with Ignition Technology’s Cyber Risk Assessment
- An internal and external perspective of your security posture
- Gap analysis of your existing end point protection
- Awareness of any compromised credentials
- Confirmation your cloud service is configured securely
- Cyber insurance readiness
- Visibility of supply chain risk
- Augmentation of existing solutions using an AI based technology to discover hidden malicious files, processes, scripts and business email compromise events
Ignition Technology was founded to help our customers to navigate the increasingly complex world of cyber security with a focus on software and software as a service technologies.
By leveraging those technologies as well as the decades of experience of our engineers in the security space, the Security Risk Assessment is designed to provide both an internal and external perspective of the security posture of your organization, identify any areas of risk or exposure and make recommendations according to industry best practice and good cyber security hygiene.

Cyber Risk Assessment
The Cyber Risk Assessment has been designed to be a light touch engagement that runs for a fixed period of time and results in real world, actionable intelligence specific to your environment that will help improve and validate your cyber security posture.
IMPROVE AND VALIDATE CYBER SECURITY
HELP PREPARE FOR CYBER INSURANCE
SUPPLY CHAIN VISIBILITY
DISCOVER UNKNOWN THREATS
CLOUD CONFIGURATION ASSESSMENT
IMPROVE ASSET AND LICENSE MANAGEMENT
Your Risk Assessment
The Ignition Technology Cyber Risk Assessment will provide you with:
BUSINESS EMAIL PROTECTION VALIDATION
VIEW OF INTERNAL AND EXTERNAL RISK
VISIBILITY OF KNOWN COMPROMISED DATA
USB DEVICE AND ADMIN TOOL USAGE
INSIGHT INTO PRIVILEGED ACCOUNT MANAGEMENT
DISCOVERY OF HIDDEN DORMANT THREATS
Your Risk Assessment
The Ignition Technology Malware Risk Assessment will provide you with:

One Engineer
We will need one engineer to help us deploy the assessment in your environment.

Two Deployments
We will deploy one virtual appliance in your environment and push out one agent, using your existing tools, to as many endpoints as you would like.

Three Calls
We will have three calls after the initial deployment to configure queries and confirm data is being gathered correctly. On the final one, we will present our findings.