Malware Risk Assessment
Get visibility in into your environment with Ignition Technology’s Malware Risk Assessment
- Gap analysis of your current endpoint protection
- Augmentation using AI based technology to discover hidden malicious files and processes
- An independent perspective of your exposure to malware or ransomware-based attack
- Visibility into the scripts running in your environment
Today’s malware is highly sophisticated, targeted and complex making it difficult to protect against. Difficult, but not impossible. An effective anti-malware solution is the minimum requirement to prevent ransomware from causing catastrophe in your organisation. It is also a base requirement for many Cyber Insurance policies. Yet many organisations today do not know for certain that they have complete coverage of their estate and are unsure of the efficacy of their chosen technology.
The average total cost of recovery from a ransomware attack has more than doubled in a year,
increasing from $761,106 in 2020 to a staggering $1.85 million in 2021. The average ransom paid in 2021 was $170,404.

Malware Risk Assessment Benefits
The Malware Risk Assessment provides visibility into your environment giving you the best chance to successfully defend your organisation.
VALIDATION OF EXISTING ENDPOINT SECURITY CONTROLS
IDENTIFYING SYSTEMS MISSING ENDPOINT PROTECTION
VERIFY LICENSE CONSUMPTION
VISIBILITY INTO USB USAGE, ADMIN TOOLS AND DORMANT THREATS
VISIBILITY INTO USB USAGE, ADMIN TOOLS AND DORMANT THREATS
VISIBILITY INTO USB USAGE, ADMIN TOOLS AND DORMANT THREATS
Your Risk Assessment
The Ignition Technology Malware Risk Assessment will provide you with:
A FULL REPORT OF YOUR EXPOSURE TO MALWARE
VIEW OF ADMIN TOOLS AND USB DEVICES
VISIBILITY OF THE HIGHEST ‘AT RISK’ DEVICES
RECOMMENDED ACTIONS WITH TRAFFIC LIGHT PRIORITY
ACCURATE VIEW OF ASSET AND LICENSE INVENTORY
IDENTIFICATION OF ANY CLASSIFIED MALWARE
Your Risk Assessment
The Ignition Technology Malware Risk Assessment will provide you with:

One Engineer
We will need one engineer to help us deploy the assessment in your environment.

Two Deployments
We will deploy one virtual appliance in your environment and push out one agent, using your existing tools, to as many endpoints as you would like.

Three Calls
We will have three calls after the initial deployment to configure queries and confirm data is being gathered correctly. On the final one, we will present our findings.