CoNetrix Audit Toolbox

The CoNetrix Audit Toolbox system is used to independently collect audit data for both remote audits and onsite audits. For onsite audits, data is collected prior to the auditor arriving onsite, in order to effectively and efficiently use onsite time.

Engagements that use the CoNetrix Audit Toolbox

How it works

  1. CoNetrix Audit Toolbox delivered and plugged-in to the network.
  2. Over a secure SSL VPN, CoNetrix performs industry standard security scans and collects customized audit data.
  3. Data is collected in the same manner an auditor would employ while onsite.
  4. Audit data is secured using industry standard encryption and protocols. Any data collected on the Toolbox is temporary as its encrypted drives are reformatted after each engagement.
  5. CoNetrix provides easy-to-read reports with findings sorted by associated risk and estimated cost.
  6. Reports are typically delivered within 2 weeks of the scans dependent on client’s size and complexity.
  7. Reports include regulatory reference, recommendations for remediation, and a detailed review with a CoNetrix security expert.
  8. Access to tandem Audit Lite, a finding and response manager, is included with CoNetrix security engagements. Audit Lite is a version of the tandem Audit software limited to tracking CoNetrix security engagements.

Request More Information

Why CoNetrix

Knowledge and Expertise:

  • CoNetrix has conducted more than 600 different IT related audit engagements since 2001.
  • The CoNetrix staff has more than 500 years of accumulated information technology, network, and security experience.
  • CoNetrix’s security experts hold numerous security certifications, such as CISSP, SSCP, CISM, CISA, and other Microsoft and Cisco security specializations.
  • CoNetrix maintains a staff of multiple network engineers.

The CoNetrix Difference:

  • CoNetrix provides easy-to-read reports with findings sorted by associated risk and estimated cost.
  • Reports include regulatory reference, remediation recommendations, and a detailed review with a CoNetrix security expert.
  • Access to the tandem Audit Lite software, a finding and response manager, is included. Audit Lite is a version of the tandem Audit software limited to tracking CoNetrix security engagements.
  • Our comprehensive work program is built upon:
    • CoNetrix audit experience
    • FFIEC Information Technology Examination Booklets
    • Gramm-Leach-Bliley Act Standards for Safeguarding Customer Information
    • Information Systems Audit and Control Association (ISACA) guidelines