Technology Assessments

Choose your Assessment Package or try our Free Sourcing-as-a-Service.

SAVE Thousands vs. Paying consulting by the hour with
 Assessments from $99 

Technology Source has 20+ years of established carrier relationships, a one-stop source for

unbiased advice, access to 87 products and services, plus the best prices from 500+ providers.

INCLUDED SERVICES

INCLUDED SERVICES

Enterprise or

 Compliance

$1,595

USD/Per Location

Technology Source Enterprise Assessment Includes:

  • Installation and configuration of agentless, non-intrusive software

  • One time scan of network

  • Generation of forms with information needed from customer to complete the assessment

  • Client Risk Report with overall risk score and list of problem areas

  • Network Management Plan with affected computers, users, and sub-systems sorted according to risk

  • Asset Detail Report listing individual assets discovered and documenting settings of workstations and servers

  • Security Risk Report showing overall relative health of network security

  • Security Management Plan with list of security risks and recommendations

  • Anomalous Login Report listing potential unauthorized users or unusual usage instances

  • External Vulnerabilities Scan Report listing

INCLUDES THE BUSINESS ASSESSMENT PLUS ONE OF THE FOLLOWING:

  • ENTERPRISE ASSESSMENT

  • HIPAA ASSESSMENT

  • GDPR ASSESSMENT

  • CMMC OR NIST ASSESSMENT

  • PCI ASSESSMENT

Requires Scope of Work Agreement

Technology Source Enterprise & Compliance 

Assessment Includes:

Free Consultation or

Source-as-a-Service

Free

INCLUDED SERVICES

Technology Source Free Sourcing Service Includes:

  • Strategy conversation with technology advisor

  • We will research provider options, bring you the best 3 - 5 proposals and warm introductions to top service providers who fit your requirements that you decide to talk to. 

  • Expert support for your organization to purchase directly from the providers you choose

  • Technology Source will act as your agent of record for placing orders with service providers and provide an extra layer of management

Business Assessment and Quarterly Reviews

$99

USD/year

MOST POPULAR

INCLUDED SERVICES

Technology Source Business Assessment Includes:

  • Includes everything in our Sourcing-as-a-Service package, plus:

  • Dedicated senior advisor assigned to your account

  • Network Design by Certified Engineers.

  • 1 hour of consulting with both advisor and  senior executive

  • Goal Review including: Cost Reduction, Reliability Improvement, Improve Security, Cloud Migration, Digital Marketing

  • Network Design

  • Multiple solution options and quotes are delivered for needs uncovered

  • Vendor selection support

  • Contract negotiation support

  • Technology Source will act as Agent of Record and place all requested orders with service providers. 

  • Ongoing quarterly business reviews

  • Install and configure agentless, non-intrusive scanning software

  • Run quarterly scan of customer’s network

  • Cyber Liability Questionnaire to catalog and store the IT security policies and procedures

  • Cyber Risk Analysis Report including overall risk score and overview of health and security of the network

  • Cyber Risk Management Plan including list of issues by sorted by severity

  • External Vulnerability Scan Report

  • Response Verification Report for the specific insurance carrier

Cyber Liability Readiness

$1,795

USD/Per Location

INCLUDES THE BUSINESS ASSESSMENT PLUS:

Technology Source Cyber Liability Readiness Annual Assessment Includes:

Requires Scope of Work Agreement

INCLUDED SERVICES

Consulting/Formal RFP

$949

USD/8 hour blocks

INCLUDED SERVICES

  • Our business assessment plus:

  • 8 hours of consulting from our top advisors and executive team who have a extensive leadership experience in cloud, cybersecurity, communications, connectivity, business improvement and more.  We work on whatever project you choose and you can purchase as many blocks of time as you need to accomplish your goals. 

  • Great option to outsource projects.   

  • May be used for Formal RFP (request for proposal) or RFI (request for information)

Technology Source Business Consulting Includes:

Technology Source HIPAA Assessment Includes:

  • Install and configure agentless, non-intrusive scanning software

  • Run quarterly scan of customer’s network

  • Generate To-Do List of assessment tasks to be completed

  • Provide customer access to compliance portal with centralized access to list of tasks required to complete the assessment

  • HIPAA Evidence of Compliance with information from automated scans and questionnaires

  • HIPAA Policies and Procedures used to implement ePHI data security and compliance

  • HIPAA Risk Analysis Report identifying protections in place and listing issues requiring remediation

  • HIPAA Management Plan with tasks required to minimize, avoid, or respond to risks

  • HIPAA Security Rule Auditor Checklist with specific compliance items, their status, and helpful references

  • HIPAA On-Site Survey to assist security officer in assessing physical security outside the computer network

  • HIPAA External Vulnerability Scan showing CVSS scores as scanned from outside the network

Technology Source GDPR Assessment Includes:

  • Install and configure agentless, non-intrusive scanning software

  • Run quarterly scan of customer’s network

  • GDPR Checklist with list of specific compliance items and helpful references

  • ISO 27001-2013 Auditor Checklist with overview of how well the organization complies with ISO 27001-2013

  • EU GDPR Policies and Procedures documenting personal data security and compliance with GDPR

  • ISO 27001-2013 Policies and Procedures demonstrating technical compliance with information security aspects of GDPR

  • Risk Treatment Plan with tasks required to minimize, avoid, or respond to risks

  • GDPR Evidence of Compliance with consolidated information from automated scans, augmented data, and questionnaires

  • Install and configure agentless, non-intrusive scanning software

  • Run quarterly scan of customer’s network

  • NIST Auditor Checklist detailing specific compliance findings from the scan with helpful references

  • NIST Risk Treatment Plan defines the strategies and tactics the organization will use to address its risks

  • NIST Risk Analysis identifies what protections are in place and where there is a need for more

  • Evidence of NIST Compliance report gathers evidence into one document to back up the NIST Auditor Checklist with real data

Technology Source CMMC/NIST Assessment Includes:

  • Install and configure agentless, non-intrusive scanning software

  • Run one time scan of customer’s network

  • Generate forms with information needed from customer to complete the assessment

  • PCI Evidence of Compliance with information from automated scans and questionnaires

  • PCI Policies and Procedures used to comply with the technical requirements of PCI, usually the first document request by the PCI examiner

  • PCI Risk Analysis Report, a list of issues to remediate to ensure the security and confidentiality of Cardholder Data

  • PCI Management Plan listing prioritized tasks, by Risk Score

  • External Vulnerability Scan showing security holes and warnings, and informational items including CVSS scores as scanned from outside the target network

Technology Source PCI Assessment Includes:

This website and Elements Table © 2020 by Technology Source

Sourcing-as-a-Service, Elements of Enterprise Solutions and Elements of Business Success are registered trademarks. 

  • Facebook Social Icon
  • LinkedIn Social Icon
  • YouTube Social  Icon