Assessment and Compliance

Evaluate Your Technology & Test Your Defenses

Reviewing network configurations and assessing security practices has to be an ongoing process. We offer a variety of options to help you identify threats, uncover vulnerabilities, test your defenses, and guide you toward compliance.

Our Benefits

Industry Compliance

Evaluate your technology and security deployment with NIST CSF, CIS, and other industry-recognized frameworks.

Expert Insights

Get comprehensive reports from experienced security analysts to guide your cybersecurity decisions.

Advanced Tools

Leverage the latest technologies to uncover vulnerabilities, evaluate risk, and test your network defenses.

Solution Confidence

Enjoy customized solutions that meet your strategic and financial needs, delivered in a way that works for you.

Concerned About the Latest Threats?

With an ever-changing cybersecurity landscape, it’s hard to stay in front of the bad guys. Most companies report not feeling ready to defend against and respond to cyber-attacks. From an assessment and compliance standpoint, the list of challenges includes:

No formal risk/vulnerability assessment process

Outdated policies and procedures

Not able to keep up with compliance regulations

Lack of cybersecurity expertise

Assessment & Compliance Services

At M.A. Polce, we have been doing assessment and compliance work with public and private organizations for over 20 years. We’ll help you evaluate your technology to identify areas for improvement, then drive you toward an optimized security posture.

Security Assessment

Lower the risk of cyber-attacks by identifying the vulnerabilities that could allow threats to infiltrate. We’ll run automated scans, review network configurations, and provide a comprehensive report that allows you to take corrective action to firm up your defenses. M.A. Polce’s Security Assessment is one of the best first steps an organization can take.

Risk Assessment

Identify, prioritize, and measure your organization’s cybersecurity risk to proactively mitigate threats. Risk assessments provide insight to ensure your organization is taking the right steps to protect assets, satisfy compliance, and effectively manage risk.

Penetration Testing

Finished fixing this issues identified in your security assessment and vulnerability scan? It’s time for a penetration test. The “pen” test is performed by our certified security professionals and determines if hackers can get past your defenses and infiltrate your network.

Tabletop Exercise

Test your preparedness in the event of a cyber-attack, breach, or other event where technology systems are disrupted. Our team will conduct a dry run through various security scenarios with members from your organization. Administrators, technical staff, and others will benefit from participating to strategize how the organization will respond if faced with real security events.

What People are Saying

Looking for Other Assessment & Compliance Solutions?

Virtual Chief Information Security Officer

Add a Certified Security Expert to your Team

Our Virtual Chief Information Security Officer (vCISO) is a remotely managed service that helps avoid costly overhead and allows you to customize a program to meet your cybersecurity needs.
Learn More

Policy & Procedure Consulting

Get Comprehensive, Customized IT & Security Policies

Governance work is our thing. After understanding your business requirements, we’ll update or create policies by leveraging our comprehensive policy collection that we’ve crafted and honed over many years.
Learn More

Best Practices Assessment

Have a Specific Area of Your Network You'd like Assessed?

Our engineers can evaluate all aspects of the IT infrastructure and provide recommendations on how to make improvements. From Active Directory to server topology to network configurations, we can help maximize your deployment.
Learn More

FAQs

Questions? This Might Help:

We have been doing assessment and compliance work with public and private organizations for over 20 years. We understand NIST CSF, CIS, and other industry-recognized frameworks from which to evaluate your technology and security deployment.

Risk assessments, security assessments, and penetration testing may take anywhere from 3-6 weeks depending on the scope of the engagement.  

We will do a comprehensive analysis of critical systems based on industry best practices.  This is done through conversations, a review of system configurations, and the use of advanced tools to hunt for vulnerabilities.  Once complete, we will deliver a detailed report outlining our findings, ranked by level of criticality.  Recommended action items are identified and clearly explained.  Most importantly, we can be engaged for post-assessment remediation if additional assistance is required.  

That all depends on the assessment work you’ve already done.  Most commonly, the best place to start is with a security assessment.  It will find all of the vulnerabilities that need to be patched and any configuration settings that should be changed.  Once those items are remedied, a penetration test is recommended to see if the bad guys can get in.

Company Insights

We Strive To Be The Best

The M.A. Polce Difference:

24/7/365 Operations & Support

Superior Customer Service

30+ Experienced Engineers

SOC 2 &
NIST Compliance

Rapid Incident Response

You are now leaving MA Polce Consulting

MA Polce Consulting provides links to web sites of other organizations in order to provide visitors with certain information. A link does not constitute an endorsement of content, viewpoint, policies, products or services of that web site. Once you link to another web site not maintained by MA Polce Consulting, you are subject to the terms and conditions of that web site, including but not limited to its privacy policy.

You will be redirected to

Click the link above to continue or CANCEL