ONE TOOL. MANY USES.

Industry-leading IT assessment tool

ServiceKey will go way beyond just network discovery and documentation to provide real "value-added intelligence" to your IT Assessments. Our proprietary data collectors compare multiple data points to uncover hard to detect issues, measure risk based on impact to the network, suggest recommended fixes and track remediation progress.

All of our core IT assessment modules are ideal for use on any network. Unlike any other IT assessment product, there are no agents, probes or software to install. The small executable scan files can run from a thumb drive plugged into any computer in the domain and in most cases the scans can be completed in well under an hour. So while you’re focusing on your business activities, ServiceKey is diligently gathering a mountain of network data and saving it in a safely-encrypted file on your thumb drive. And when it’s done, it leaves no "traces" of your activity, no conflicts with other applications, no firewall issues and nothing to remember to uninstall.

Your company can prosper
year after year

learn more

Comprehensive IT Assessments

ServiceKey offers a wide range of software tools, each designed to produce a unique set of specialized reports for a different type of IT assessment. The more modules you have, the broader the range of assessments you will be able to perform and the more opportunities you will have to build out and support your IT service portfolio. We also offer specialized software appliances that will take your IT assessments to the next level.

Network Assessment

A Network Assessments give you the broadest insights into your IT infrastructure. You’ll find that they are an indispensable asset to your business that will give you a comprehensive breakdown of your company’s IT environment providing a risk summary, asset performance overview and inventory management breakdown. ServiceKey will streamline your business with ongoing reporting and quarterly business reviews to keep your network at peak performance.

Our network assessment comes with a complete set of reports that touches on the broadest range of systems, network assets, settings, configuration, installed applications and endpoint security. It also includes a an active directory site diagram and detailed information in an excel format.

learn more >>
Security Assessment

When you utilize ServiceKey to deliver your security assessment, we will run our exclusive non-invasive data collector on your domain server. We let our proprietary data analyzer crunch the network data and produce a baseline set of network security reports for your organization to review. There is a huge demand for IT security services and very few service providers have the skills on staff to deliver a comprehensive security assessment. By performing regular security health checks, ServiceKey can help our clients protect their assets and guard against downtime, so you sleep better at night.

Includes a full set of security reports that focuses on network and user-related security risks and is designed to allow you to offer a basic managed security service to all of your clients. This report reveals which users have access to what systems and what systems are configured with what permissions. This module also includes a powerful integrated external vulnerabilities scan.

learn more >>
HIPAA Compliance Assessment

ServiceKey’s HIPAA compliance assessment is used to combine the automated collection of network data with information gathered through observations, photographs and surveys. We will automatically generate a complete set of the official documents that comprise a comprehensive HIPAA IT assessment including: HIPAA policy and procedures, HIPAA risk analysis, HIPAA management plan, evidence of HIPAA compliance and all associated supporting documentation. ServiceKey will provide a wealth of information and reporting, saving you untold days, or even weeks worth of production work.

Our assessment is a purpose-built IT tool to combine automated collection of network data with information collected through observations, photographs and surveys. It's also the only software that gives you a repository to safely and securely collect all the data and a built-in HIPAA risk assessment engine that automatically generates the official documents that comprise a comprehensive HIPAA IT assessment.

learn more >>
PCI Compliance Assessment

ServiceKey’s PCI methodology is hands-down, the optimal way to perform a PCI compliance assessment and IT audit. We create a tangible set of documents that will help inform our clients about their risks, if any, and serve as their "proof" that they've done their due diligence in the event of a surprise audit or post-breach investigation.

ServiceKey has broad business market opportunity and should be used at any network where your clients accept credit cards – including retailers, online merchants, and mail order companies. Similar in approach to the HIPAA compliance module, the PCI tool combines automated collection of network data with information collected through observations, photographs and surveys. It also automatically generates the official documents that comprise a comprehensive PCI data security assessment.

learn more >>

Offering solutions that raise your business above the expected

learn more

Features and Benefits

ServiceKey has the only IT assessment toolset on the market that is fast, easy-to-use, completely non-invasive and affordable for any business. To learn more about the features and benefits of this tool, check out the quick headline summary below.

Simple to Use
NO SOFTWARE OR AGENTS TO INSTALL! We proficiently scan your entire network from a single computer! All data collectors run in memory and when done, go away, saving valuable time and eliminating concerns.


Fast
Scans run quickly and are implemented on-site or via remote connection. We import our results into the data analyzer and generate customized reports for our review meeting, eliminated several business days that an assessment would normally take. We use our customized assessment scheduling tools to run scans on larger networks during low-demand times.


Non-invasive
Data collector runs in memory with no changes made to system or network so 100% safe. They utilize a very small footprint with no detectable performance degradation to the network.


Secure
No business data or passwords are gathered or transmitted, and there is no need to modify your firewall settings which could in other situations compromise network or system security. All data collected (with the exception of an External Scan) is 100% local, so you know exactly where your data is located.


Identifies Critical Issues
Our Assessment provides the information necessary to analyze and confirm compliance concerns and issues and uncover new potential problems. We often find issues others miss with their substandard Internal and External vulnerabilities scans.


learn more >>