About us | Technology Source
top of page

Choose your Assessment Package

or try our Free Sourcing-as-a-Service.

SAVE Thousands vs. Paying consulting by the hour with Assessments from $99 

Technology Source has 20+ years of established service provider relationships, a one-stop source for unbiased advice, access to 87 products and services, plus the best prices from 500+ providers.

Free Consultation or

Source-as-a-Service

​​Technology Source Free Sourcing Service Includes:

  • Strategy conversation with technology advisor

  • We will research provider options, bring you the best      3 proposals and warm introductions to top service providers who fit your requirements that you decide to talk to. 

  • Expert support for your organization to purchase directly from the providers you choose

  • Technology Source will act as your agent of record for placing orders with service providers and provide an extra layer of management

FREE

INCLUDED SERVICES

Business Assessment and Quarterly Reviews

​​Technology Source Business Assessment Includes:

  • Includes everything in our Sourcing-as-a-Service package, plus:

  • Dark Web Scan for Sensitive Company information

  • Dedicated Sr. Advisor.

  • 1 hour of consulting with both advisor and engineer.

  • Goal Review including: Cost Reduction, Reliability Improvement, Improve Security, Cloud Migration, Digital Marketing

  • Network Designs

  • Multiple solution options and quotes are delivered for needs uncovered

  • Vendor selection support

  • Contract negotiation support

  • Technology Source will act as Agent of Record and place all requested orders with service providers. 

  • Ongoing quarterly business reviews

$99

INCLUDED SERVICES

USD/YEAR

Enterprise or

 Compliance

Technology Source Enterprise & Compliance 

Assessment Includes:

INCLUDES THE BUSINESS ASSESSMENT PLUS ONE OF THE FOLLOWING:​

  • ENTERPRISE ASSESSMENT

  • HIPAA ASSESSMENT

  • GDPR ASSESSMENT

  • CMMC OR NIST ASSESSMENT

  • PCI ASSESSMENT

  • Installation and configuration of agentless, non-intrusive software

  • One time scan of network

  • Generation of forms with information needed from customer to complete the assessment

  • Client Risk Report with overall risk score and list of problem areas

  • Network Management Plan with affected computers, users, and sub-systems sorted according to risk

  • Asset Detail Report listing individual assets discovered and documenting settings of workstations and servers

  • Security Risk Report showing overall relative health of network security

  • Security Management Plan with list of security risks and recommendations

  • Anomalous Login Report listing potential unauthorized users or unusual usage instances

  • External Vulnerabilities Scan Report listing

Technology Source HIPAA Assessment Includes:

  • Install and configure agentless, non-intrusive scanning software

  • Run quarterly scan of customer’s network

  • Generate To-Do List of assessment tasks to be completed

  • Provide customer access to compliance portal with centralized access to list of tasks required to complete the assessment

  • HIPAA Evidence of Compliance with information from automated scans and questionnaires

  • HIPAA Policies and Procedures used to implement ePHI data security and compliance

  • HIPAA Risk Analysis Report identifying protections in place and listing issues requiring remediation

  • HIPAA Management Plan with tasks required to minimize, avoid, or respond to risks

  • HIPAA Security Rule Auditor Checklist with specific compliance items, their status, and helpful references

  • HIPAA On-Site Survey to assist security officer in assessing physical security outside the computer network

  • HIPAA External Vulnerability Scan showing CVSS scores as scanned from outside the network

Technology Source GDPR Assessment Includes:

  • Install and configure agentless, non-intrusive scanning software

  • Run quarterly scan of customer’s network

  • GDPR Checklist with list of specific compliance items and helpful references

  • ISO 27001-2013 Auditor Checklist with overview of how well the organization complies with ISO 27001-2013

  • EU GDPR Policies and Procedures documenting personal data security and compliance with GDPR

  • ISO 27001-2013 Policies and Procedures demonstrating technical compliance with information security aspects of GDPR

  • Risk Treatment Plan with tasks required to minimize, avoid, or respond to risks

  • GDPR Evidence of Compliance with consolidated information from automated scans, augmented data, and questionnaires

Technology Source CMMC/NIST Assessment Includes:

  • Install and configure agentless, non-intrusive scanning software

  • Run quarterly scan of customer’s network

  • NIST Auditor Checklist detailing specific compliance findings from the scan with helpful references

  • NIST Risk Treatment Plan defines the strategies and tactics the organization will use to address its risks

  • NIST Risk Analysis identifies what protections are in place and where there is a need for more

  • Evidence of NIST Compliance report gathers evidence into one document to back up the NIST Auditor Checklist with real data

Technology Source PCI Assessment Includes:

  • Install and configure agentless, non-intrusive scanning software

  • Run one time scan of customer’s network

  • Generate forms with information needed from customer to complete the assessment

  • PCI Evidence of Compliance with information from automated scans and questionnaires

  • PCI Policies and Procedures used to comply with the technical requirements of PCI, usually the first document request by the PCI examiner

  • PCI Risk Analysis Report, a list of issues to remediate to ensure the security and confidentiality of Cardholder Data

  • PCI Management Plan listing prioritized tasks, by Risk Score

  • External Vulnerability Scan showing security holes and warnings, and informational items including CVSS scores as scanned from outside the target network

$1,595

INCLUDED SERVICES

USD/Per Location

Requires Scope of Work Agreement

Cyber Liability Readiness

Technology Source Cyber Liability Readiness Annual Assessment Includes:

INCLUDES THE BUSINESS ASSESSMENT PLUS:

  • Install and configure agentless, non-intrusive scanning software

  • Run quarterly scan of customer’s network

  • Cyber Liability Questionnaire to catalog and store the IT security policies and procedures

  • Cyber Risk Analysis Report including overall risk score and overview of health and security of the network

  • Cyber Risk Management Plan including list of issues by sorted by severity

  • External Vulnerability Scan Report

  • Response Verification Report for the specific insurance carrier

$1,795

INCLUDED SERVICES

USD/Per Location

Requires Scope of Work Agreement

Consulting/Formal RFP

​​Technology Source Business Consulting Includes:

  • Our business assessment plus:

  • 8 hours of consulting from our top advisors and executive team who have a extensive leadership experience in cloud, cybersecurity, communications, connectivity, business improvement and more.  We work on whatever project you choose and you can purchase as many blocks of time as you need to accomplish your goals. 

  • Great option to outsource projects.   

  • May be used for Formal RFP (request for proposal) or RFI (request for information)

$949

INCLUDED SERVICES

USD/8 hour blocks

MOST POPULAR

Register For Our Next Roundtable Event
on April 16th on Zoom

bottom of page