SANS Top 20 Assessment

During this assessment, we cover everything;  Device Inventory, Software Inventory, Secure Config of both Hardware & Software, Secure Network Config, Boundary Defense, M.M.A. (Maintenance, Monitoring, and Analysis of audit logs), Application Security, and Admin Privileges.

Inventory of Authorized and Unauthorized Devices
Inventory of Authorized and Unauthorized Software
Secure Configurations for Hardware and Software
Secure Configurations of Network Devices
Boundary Defense
Maintenance, Monitoring, and Analysis of Audit Logs
Application Software Security
Controlled Use of Administrative Privileges
Controlled Access
Vulnerability Management
Account Monitoring and Control
Malware Defense
Limitation and Control of Network Ports, Protocols and services
Wireless
Data Loss Prevention
Secure Networking
Red Team Exercises
Incident Response
Data Recovery
Training

Pricing: Covering quite a bit and at an incredibly affordable rate of $9,950