products
Financial Solutions
ATMs
Remote Cash Capture
Document Management
Payment Systems
Branch Transformation
Cash Recyclers
Lobby Self-Service Coin
Self-Service Kiosks
Coin & Currency Sorters
IT Solutions
Cybersecurity Services
Info Security Assessments
Managed IT Services
Cannabis
Casino
Ticket Redemption Kiosks
Cage & Vault Automation
Soft Count Solutions
Coin & Currency Solutions
Retail
SMART Cash Management
Remittance Processing
Document Management
Coin & Currency Solutions
Support
About
Contact
Kind Words
Case Studies
Meet the Team
Work With Us
Our Blog
952-890-6661
Request Service
Order Supplies
952-890-6661
Request Service
Order Supplies
products
ATMs
Remote Cash Capture
Document Management
Payment Systems
Branch Transformation
Cash Recyclers
Lobby Self-Service Coin
Self-Service Kiosks
Coin & Currency Sorters
IT Solutions
Cybersecurity Services
Info Security Assessments
Managed IT Services
Cannabis
Casino
Ticket Redemption Kiosks
Cage & Vault Automation
Soft Count Solutions
Coin & Currency Solutions
Retail
SMART Cash Management
Remittance Processing
Document Management
Coin & Currency Solutions
Support
About
Contact
Kind Words
Case Studies
Meet the Team
Work With Us
Our Blog
Information Security Request Proposal Form
Name:
(Required)
First
Last
Company:
(Required)
Title:
Phone
Email
(Required)
Select One:
(Required)
1 year agreement
2 year agreement
3 year agreement
Please select below any assessments or tests your would like us to include in your proposal.
View Bankers Recommended Quantities
Administrative Controls Assessment:
Administrative Controls Assessment:
Description: Review of all documentation, processes, and practices used to manage information security, divided into ten sections: risk management, information security governance, human resources security, asset management, access control, cryptography, security operations, incident management, business continuity management, and compliance. It includes meetings with personnel knowledgeable about the organization's policies, awareness training, guidelines, standards, and procedures.
Quantity
(Required)
Physical Controls Assessment:
Physical Controls Assessment:
Description: Site walkthrough and environmental report to assess physical access controls to critical information resources and equipment.
Quantity
(Required)
Internal Vulnerability Assessment:
Internal Vulnerability Assessment:
Description: Examination of network architecture, protocols, and vulnerabilities through methods such as internal network scanning and tests for password policies and system settings.
Quantity
(Required)
External Vulnerability Assessment:
External Vulnerability Assessment:
Description: Identification of vulnerabilities in perimeter defenses and external access controls through examination and port scanning.
Quantity
(Required)
Internal Penetration Test:
Internal Penetration Test:
Description: Simulated attack to identify and exploit vulnerabilities within the internal network.
Number of devices on internal network to be tested?
(Required)
Quantity
(Required)
External Penetration Test:
External Penetration Test:
Description: Simulated attack to identify and exploit vulnerabilities from an external perspective, demonstrating potential impacts.
Indicate the number of external/public IP Addresses to be tested?
(Required)
Quantity
(Required)
Phishing Campaign:
Phishing Campaign:
Description: Email phishing attack to test employees' susceptibility to revealing privileged information.
Quantity
(Required)
Pretext Calling Attack:
Pretext Calling Attack:
Description: Series of phone calls to coerce privileged information from employees. We will persist until we’ve contacted three different individuals.
Quantity
(Required)
Microsoft 365 Security Assessment
Microsoft 365 Security Assessment
Description: Test and subsequent scoring limited to active Microsoft licenses/subscriptions
Quantity
(Required)
Active Directory Password Audit
Active Directory Password Audit
Quantity
(Required)
Wi-Fi Security Assessment
Wi-Fi Security Assessment
How many access points?
(Required)
Quantity
(Required)
Tabletop Disaster Recovery Exercise
Tabletop Disaster Recovery Exercise
Number of participants?
(Required)
Onsite or remote?
(Required)
Onsite
Remote
Quantity
(Required)
Custom Requests:
Name
This field is for validation purposes and should be left unchanged.