Skip to main content Skip to footer

Interested?

Get in touch

Know your cyber risks

A clear, independent view of your cyber security posture, delivered with practical priorities you can act on.


Our Cyber Security Assessment provides you with a fact-based understanding of your current cyber risk. It replaces assumptions with evidence and helps you make informed decisions about where to focus effort and investment. The result is clarity, not noise.

What the assessment delivers

A clear view of your current cyber security posture
Evidence based insight into gaps and weaknesses
Alignment to recognised frameworks, including CIS Critical Security Controls
A prioritised, practical roadmap for improvement
Reporting suitable for both technical teams and senior leadership

The focus is on real risk and sensible next steps, not theoretical issues or product driven recommendations.

How the assessment works

The assessment combines automated data collection with a guided review of policies, procedures, and operational practices. This ensures both technical and organisational risks are evaluated.
Our consultants analyse the findings and translate them into clear, actionable recommendations that support informed decision making.
The assessment also supports NIS related considerations and wider assurance requirements.

Assessment options

Quick Scan Full Scan
Overview A rapid baseline assessment for organisations that want clarity without delay. A comprehensive assessment for larger or more complex environments, typically organisations with 300 or more employees.
Typical delivery time Typically completed within three days Typically completed within five days
Assessment depth Snapshot assessment aligned to CIS controls with automated data collection. In depth review of technical and organisational controls aligned to the full CIS control set.
Key outputs
  • Identification of key gaps and weaknesses
  • Concise report with prioritised actions
  • Detailed findings with risk based prioritisation
  • Practical planning for recommended improvements
  • Optional ongoing support through ITPS vCISO services
Supported environments Automated data collection across supported systems.
  • Windows endpoints and servers
  • Microsoft 365, Azure AD and on premises Active Directory
  • AWS and Linux systems
  • Network devices
  • Other platforms subject to access and scope
Best suited for
  • Organisations seeking an initial cyber security baseline
  • Board and senior leadership visibility
  • Pre audit or pre project assurance
  • Organisations planning structured security improvement programmes
  • Budget and investment decision making
  • Cyber security maturity uplift and roadmap creation

Why us

The Cyber Security Assessment is more than a software output. We deliver the full assessment lifecycle.


By working with us, you benefit from:

  • Certified cyber security specialists and assessors
  • Expert interpretation of technical findings
  • Clear translation of risk into business focused actions
  • A tailored cyber security roadmap aligned to your organisation

Frequently asked questions

Is the assessment cloud based?
No. The CSA tooling is installed within the customer environment on a Windows Server or suitable endpoint. All collected data remains inside the organisation and the tooling is removed once the assessment is complete.
Who can access the data?
Only the customer and authorised ITPS consultants delivering the assessment have access to the data. No information is transmitted externally or stored in the cloud.
Is the data used for any other purpose?
No. Data is used solely to assess cyber security posture and produce a fact based improvement plan.
Does the assessment install permanent software?
No. Temporary agents may be deployed to selected endpoints to collect data and are automatically removed once complete.
Will the assessment impact systems or performance?
The assessment is designed to minimise impact. Data collection is controlled and limited to avoid disruption to normal operations.
Is this a monitoring or detection service?
No. The assessment provides a point in time view of cyber security posture. It is not a continuous monitoring or detection tool.
We already use penetration testing and security tools. Is this still relevant?
Yes. Penetration testing and monitoring focus on active vulnerabilities or incidents. The Cyber Security Assessment takes a wider view, assessing configuration, identity, access and organisational controls to define the right priorities.
Our IT is outsourced. Is the assessment still useful?
Yes. Responsibility for cyber security governance remains with the organisation. The assessment provides independent assurance of current posture, regardless of delivery model.
Is onsite delivery required?
No. The assessment can be delivered remotely using secure access agreed with the customer.

Book a meeting today!

As problem solvers, we work with all types and sizes of organisation, with a proven record of success across many sectors including public sector, healthcare, finance, manufacturing and not for profit. Book a meeting with one of our experts today.

Our vendors, suppliers, and partners