Together with you, we will discuss objectives and expectations for the assessment. Through a structured interview, we would like to ask you for important information for our further work. We will introduce you to your personal contact for the duration of the assessment and demonstrate the components you need to use.
Step 2: We talk to IT security, data protection and staff representatives
If you would like we can talk to the responsible people in your house and inform them about data that are collected during the assessment and how it is processed. If there are specific requirements on the part of these responsible people, they will now be included and configured into the components used. This can be, for example, the anonymization of certain data.
Step 3: We conduct the data collection
With user data you provide we collect the data. If you have a large or distributed infrastructure, you can coordinate night jobs. Due to the high speed of our components, even for several 100,000 files, this survey usually takes not more than one day.
Step 4: Evaluation
The data collected is now compared to different patterns. We summarize the results in a report for you, which we will hand over to you after the completion of the assessment. In addition to the results values (see above), details on the process of collecting the data are also included here. Based on the expectations raised in the interview and the insights that have now been obtained, we will draw up a conclusion for you.
Step 5: Results presentation
Together we discuss the outcome of the assessment, the resulting conclusion and possible further steps. You will receive all the documents we have created. Our components and the data collected will be completely removed from your systems. There is still time for your questions or the consideration of particularly noteworthy case studies here.