First level navigation Menu
technology assessment

Technology Assessments

Eliminate the unknown – gain insights into your business

 

The first six months of 2019 have seen more than 3,800 publicly disclosed breaches exposing an incredible 4.1 billion compromised records.1 Gain the visibility, insight and solutions you need to safeguard your business. As the expression goes, you don’t know what you don’t know. In business, that’s a risk you can’t afford to take. Ricoh’s full suite of Technology Assessments eliminates the unknown for you. Whether you need insight into network gaps, infrastructure capabilities, security threats or cloud readiness, our experts can conduct the right assessments for your business and provide insights you need to make informed decisions.

 
 

Technology Infrastructure Assessment

 
business people meeting

Technology is integral to the strategic success of a business. Our team of virtual CIOs ask the right questions to better understand your business needs and objectives. We can assess your current IT infrastructure and systems to create a customized plan that aligns your business goals with the technology you need.

Understand the current state of your systems, services and processes in a formally documented report. Our consultants can identify gaps and provide a list of recommendations for all areas of your IT environment related to your infrastructure, including a recommended timeline to achieve your goals and probable support requirements to fulfill requirements on time.

Our technology infrastructure assessment can help you:

  • Optimize costs
  • Minimize business risk
  • Improve information security
  • Increase project success
  • Enhance back-up and disaster recovery plans

No technology roadmap is the same, just as no two businesses are the same. We understand how your unique business requirements need solutions that are customized to meet the needs of your customers. Ricoh can help.

 

Security Infrastructure Assessments

 
IT technician

Know how effective your security measures and protocols are with a comprehensive review using multiple security assessments delivered by our technology security consultants. To thoroughly understand your business requirements, we can run onsite vulnerability assessments, cyber security risk assessments, external penetration testing and internal penetration testing to weigh the risk and impact of a potential attack.

Ricoh’s security consultants can determine gaps, vulnerabilities and threats, based on the type of assessment you are most interested in. In addition to performing assessments and tests, we better understand your business goals, cost considerations and industry-specific compliance challenges. At the end of each assessment, you will receive a detailed outline of gaps found and recommendations to close found gaps in order of priority within a given timeline.

 

 

Vulnerability Assessment

Uncover everything that can pose a threat to your IT environment. We identify and scan all externally facing assets for vulnerabilities including missing patches, outdated software versions, open ports, and OS services. Our team will review your entire IT environment, so that you get a complete picture of your cyber risk exposure and associated levels of risk. This assessment includes:

 

  • Collecting information about your business through publicly available sources
  • Listing all internet-facing assets
  • Scanning ports and exposed services
  • Assessing all software for exposures and/or misconfigurations
  • Prioritizing vulnerabilities and recommend solutions

Penetration Testing

The best way to understand the real risk to your business is to suffer an attack on your systems, applications, and data. Find out how an attacker can gain access to your systems and data with a simulated attack to identify gaps that can exploited. This test mimics how that might happen. Our security consultants attempt to compromise your networks, operating systems, and web applications and develop a plan to harden your defenses. This assessment includes:

 

  • Working with your team to identify goals for testing
  • Linking multiple vulnerabilities to achieve goals
  • Trying tests to by-pass security controls, such as anti-malware and two-factor authentication
  • Identifying and traveling through comprised hosts for access to sensitive areas within the network
  • Providing a detailed assessment of gaps within security controls and measures
  • Prioritizing list of recommended solutions on a timeline

Web Application Testing

Prevent malware distribution, breach of client data, and bypassed security controls by finding the vulnerabilities within your business web applications before someone else does. This assessment includes:

 

  • Performing an automated vulnerability scan of servers
  • Testing application logic for flaws manually
  • Taking advantage of identified vulnerabilities to gain access
  • Providing a detailed assessment of identified vulnerabilities and recommended solutions

Social Engineering Testing

This test evaluates your systems from the inside and identifies where you can improve. Test the “human firewall” of your organization with phishing campaigns designed to identify areas of weakness and establish a baseline of user behaviour for necessary security measures. This assessment includes:

 

  • Attempting a breach through email phishing, application updates and password hacks
  • Testing user behaviour to determine a baseline for weak security protocols
  • Providing a detailed assessment of all identified vulnerabilities and recommended solutions
 

Cloud-readiness Assessment

 

IT technical team

Not sure what you can move to the cloud and if your business is ready for the move? With a cloud-readiness assessment your business will benefit from a comprehensive mapping and inventory of technology assets that will help you make the move the right way.

We will assess your existing IT, what's working, what's not working, and gain an understanding of your business requirements and what cloud solutions may be right for you. Our technology strategists will work to match your business requirements to the right IT solutions by creating a strategic plan made up of the best combination of virtualization and provider recommendations to transition and transform onto cloud-enabled platforms.

Let our team assess eight key areas of your technology environment to determine your suitability for cloud migration. We’ll review eight key areas:

  • Hardware
  • Network and connectivity
  • Software and applications
  • Data and information assets
  • Business growth plans and projections
  • Disaster recovery and business continuity plans
  • Mobility requirements (of information and people)
  • Personnel (employee size, locations, etc)

Once your strategy is set, we look at execution and deployment plans to begin transitioning to the right virtual or physical environment. From there we'll work with you to maintain and continuously improve your cloud strategy and look at next steps. Turning technology into innovation. Turning vision into reality. This is Insightful IT.

 
 

See more on our solutions

  • IT Support Services

    Ricoh provides on-demand end-to-end IT Support Services aligned to your business needs. You can choose us to fully manage your IT department or augment the one you have. We are there for you 24/7 for 365 days a year. Get back to focusing on what you do best and leave IT to us!

    1 / 3
  • IT Procurement & Project Management

    Spend smarter. We partner with the most trusted technology brands on the market, ensuring great pricing and availability of devices, servers and other hardware that your business needs. In addition, our PMP-certified team can keep your project organized and effective from beginning to end.

    2 / 3
  • Cloud Solutions & Services

    Allow our experienced cloud architects can guide you through the process. Our cloud services can help you create a custom solution that addresses your unique requirements in a secured, flexible, scalable, and highly available environment using public, private and hybrid cloud technology.

    3 / 3
 
1Forbes, 2019, “Data Breaches Expose 4.1 Billion Records In First Six Months of 2019”, https://www.forbes.com/sites/daveywinder/2019/08/20/data-breaches-expose-41-billion-records-in-first-six-months-of-2019/#24d68b0abd54