{"id":113437,"date":"2023-12-14T19:51:00","date_gmt":"2023-12-14T19:51:00","guid":{"rendered":"https:\/\/crtech.devcherryroad.com\/?page_id=113437"},"modified":"2024-12-17T17:59:41","modified_gmt":"2024-12-17T17:59:41","slug":"enterprise-security-assessment","status":"publish","type":"page","link":"https:\/\/devcherryroad.com\/cherryroad\/services\/strategy-consulting\/enterprise-security-assessment\/","title":{"rendered":"Enterprise Security Assessment"},"content":{"rendered":"\n<div class=\"wp-block-stackable-columns alignfull stk-block-columns stk-block stk-1b4fb3f\" data-block-id=\"1b4fb3f\"><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-1b4fb3f-column alignfull\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-bcf2a37\" data-v=\"4\" data-block-id=\"bcf2a37\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-bcf2a37-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-bcf2a37-inner-blocks\">\n<div class=\"wp-block-stackable-columns alignfull stk-block-columns stk-block stk-99afedd stk-block-background stk--has-background-overlay\" data-block-id=\"99afedd\"><style>.stk-99afedd{background-color:#000000 !important;background-image:url(https:\/\/devcherryroad.com\/cherryroad\/wp-content\/uploads\/sites\/27\/2024\/09\/logme-1.jpg) !important;min-height:300px !important;align-items:center !important;margin-bottom:50px !important;display:flex !important}.stk-99afedd:before{background-color:#000000 !important;opacity:0.6 !important}.stk-99afedd-column{--stk-columns-spacing:20px !important;--stk-column-gap:20px !important;row-gap:20px !important}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-99afedd-column alignfull\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-517f534\" data-v=\"4\" data-block-id=\"517f534\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-517f534-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-517f534-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-9291669\" id=\"enterprise-security-assessment\" data-block-id=\"9291669\"><style>.stk-9291669 .stk-block-heading__text{color:var(--theme-palette-color-8,#ffffff) !important}<\/style><h2 class=\"stk-block-heading__text has-text-color has-text-align-center\">Enterprise Security Assessment<\/h2><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-columns stk-block-columns stk-block stk-1f35fbb\" data-block-id=\"1f35fbb\"><style>.stk-1f35fbb{margin-bottom:100px !important}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-1f35fbb-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-80b49d9\" data-v=\"4\" data-block-id=\"80b49d9\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-80b49d9-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-80b49d9-inner-blocks\">\n<div class=\"wp-block-stackable-columns stk-block-columns stk-block stk-7c30db4\" data-block-id=\"7c30db4\"><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-7c30db4-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-062c044\" data-v=\"4\" data-block-id=\"062c044\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-062c044-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-062c044-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-01709f3\" id=\"assessing-your-enterprise-security\" data-block-id=\"01709f3\"><h2 class=\"stk-block-heading__text has-text-align-center\">Assessing Your Enterprise Security<\/h2><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-0f85726\" data-block-id=\"0f85726\"><p class=\"stk-block-text__text has-text-align-center\">Both broad and targeted cyber threats and attacks are steadily increasing in frequency and complexity, making the importance of fail-safe security more paramount than ever. Yet, with inadequate budgets and the need to comply with intensifying regulations, public sector organizations face significant challenges in protecting citizen data as well as their information assets, infrastructure, and services. Indeed, cyber security is the number-one strategic priority for state and local CIOs, according to the National Association of State Chief Information Officers (NASCIO).<\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-abae5e3\" data-block-id=\"abae5e3\"><p class=\"stk-block-text__text has-text-align-center\">With decades of IT engagements in public sector organizations, CherryRoad is uniquely qualified to serve as your cybersecurity partner. Our comprehensive Enterprise Security Assessment uncovers vulnerabilities in your organization\u2019s IT capabilities, policies, and procedures that allow for network penetration, data breaches, loss of services, and numerous other risks.<\/p><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-columns stk-block-columns stk-block stk-77ebb28\" data-block-id=\"77ebb28\"><style>.stk-77ebb28{margin-bottom:100px !important}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-77ebb28-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-1ae1f94\" data-v=\"4\" data-block-id=\"1ae1f94\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-1ae1f94-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-1ae1f94-inner-blocks\">\n<div class=\"wp-block-stackable-image stk-block-image stk-block stk-4def3b3\" data-block-id=\"4def3b3\"><style>.stk-4def3b3 .stk-img-wrapper{width:79% !important;height:295px !important}<\/style><figure><span class=\"stk-img-wrapper stk-image--shape-stretch\"><img loading=\"lazy\" decoding=\"async\" class=\"stk-img wp-image-113438\" src=\"https:\/\/devcherryroad.com\/cherryroad\/wp-content\/uploads\/sites\/27\/2023\/12\/enterprise-security-assessment-600x360-1.jpg\" width=\"600\" height=\"360\" alt=\"enterprise-security-assessment-600x360\" srcset=\"https:\/\/devcherryroad.com\/cherryroad\/wp-content\/uploads\/sites\/27\/2023\/12\/enterprise-security-assessment-600x360-1.jpg 600w, https:\/\/devcherryroad.com\/cherryroad\/wp-content\/uploads\/sites\/27\/2023\/12\/enterprise-security-assessment-600x360-1-300x180.jpg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/span><\/figure><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-e07ef0e\" data-v=\"4\" data-block-id=\"e07ef0e\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-e07ef0e-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-e07ef0e-inner-blocks\">\n<div class=\"wp-block-stackable-columns stk-block-columns stk-block stk-44be663\" data-block-id=\"44be663\"><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-44be663-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-d044d67\" data-v=\"4\" data-block-id=\"d044d67\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-d044d67-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-d044d67-inner-blocks\">\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-9c15f7a\" data-block-id=\"9c15f7a\"><p class=\"stk-block-text__text\">Our assessments span external and internal penetration tests, applications, user security awareness, disaster recovery, firewall and border security, web and email content filtering, directory configuration, and proprietary information. With comprehensive knowledge of your vulnerabilities, we develop our remediation recommendations to maximize both the security of your environment and the cost-effectiveness of protecting it.<\/p><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-columns stk-block-columns stk-block stk-95c205d\" data-block-id=\"95c205d\"><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-95c205d-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-42521cb\" data-v=\"4\" data-block-id=\"42521cb\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-42521cb-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-42521cb-inner-blocks\">\n<div class=\"wp-block-stackable-columns stk-block-columns stk-block stk-073d41e\" data-block-id=\"073d41e\"><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-073d41e-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-87023af\" data-v=\"4\" data-block-id=\"87023af\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-87023af-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-87023af-inner-blocks\">\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-5632d09\" data-block-id=\"5632d09\"><style>.stk-5632d09{margin-bottom:23px !important}<\/style><p class=\"stk-block-text__text has-text-align-left\">With CherryRoad\u2019s Enterprise Security Assessment services, your organization can effectively:<\/p><\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Identify its cyber security infrastructure vulnerabilities, as well as potential risks for threats and intrusions<\/li>\n\n\n\n<li>Mitigate risks with high-value solutions based on security best practices<\/li>\n\n\n\n<li>Comply with increasing regulations<\/li>\n<\/ul>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Enterprise Security Assessment Assessing Your Enterprise Security Both broad and targeted cyber threats and attacks are steadily increasing in frequency and complexity, making the importance of fail-safe security more paramount than ever. Yet, with inadequate budgets and the need to comply with intensifying regulations, public sector organizations face significant challenges in protecting citizen data as [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":113426,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_gspb_post_css":"","footnotes":""},"class_list":["post-113437","page","type-page","status-publish","hentry"],"blocksy_meta":[],"_links":{"self":[{"href":"https:\/\/devcherryroad.com\/cherryroad\/wp-json\/wp\/v2\/pages\/113437","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devcherryroad.com\/cherryroad\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/devcherryroad.com\/cherryroad\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/devcherryroad.com\/cherryroad\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/devcherryroad.com\/cherryroad\/wp-json\/wp\/v2\/comments?post=113437"}],"version-history":[{"count":1,"href":"https:\/\/devcherryroad.com\/cherryroad\/wp-json\/wp\/v2\/pages\/113437\/revisions"}],"predecessor-version":[{"id":114461,"href":"https:\/\/devcherryroad.com\/cherryroad\/wp-json\/wp\/v2\/pages\/113437\/revisions\/114461"}],"up":[{"embeddable":true,"href":"https:\/\/devcherryroad.com\/cherryroad\/wp-json\/wp\/v2\/pages\/113426"}],"wp:attachment":[{"href":"https:\/\/devcherryroad.com\/cherryroad\/wp-json\/wp\/v2\/media?parent=113437"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}