Asset Discovery Service

In Red Lion asset discovery services, we'll find every computer, virtual machine, networking device, IoT, OT, and system in your network, then we'll map out the hosts, devices, and services that run your network and identify the operating system for each. Finally, we'll analyze communications and share a one-page summary for your technical & executive team to review.

Asset Discovery Jobs Include:

  • 01 One-page executive summary allowing executives to make business-case risk decisions

  • 02 Discovery of every computer, virtual machine, networking device, IoT, OT, and system

  • 03 Map of the hosts, devices, and services that are running the network

  • 04 Determination of the operating system for each host, device, and service that is running the network

  • 05 Analysis of communications to identify type, software version, and patch level, for every host, device, and service

  • 06 Review each result-set for accuracy, removal of false positives and negatives

  • 07 Ability to identify, classify, and categorize all your systems, applications, and devices

  • 08 Option to categorize by type, value, or threat.

Asset Discovery Meeting

The Red Lion Approach

  • We help you discover your needs and goals.

    Your Red Lion security consultant will meet with you to gain an understanding of your business, the issues that you are currently facing, and the overall goals for business and the project at hand.

  • We work with you to define value points.

    Once your needs and goals are understood, our professionals will continue to dig into your processes, procedures, and systems to identify specific value points and deliverables and we build a plan to achieve those.

  • We execute for your success

    Once built, our experts will get to work executing the plan as outlined. During execution we'll have periodic updates to keep you in the loop and give you opportunities for feedback to make sure things are on track.

  • We are your trusted advisors

    Red Lion professionals pride themselves on their knowledge and trustworthiness. You can rest assured that any information shared with your Red Lion Security Consultant will remain private and if you ever have any cyber security or compliance questions you can always reach out to your Red Lion security consultant.

Translate »