footprints
External Footprint Analysis

PRIMARY CONTACT: Carl N. Kriebel CISSP

Schneider Downs consultants will use commonly available open source tools, scanners and databases which can be acquired by any attacker to obtain a blueprint of the client and its Internet profile.

Our team's approach external foot printing without any significant prior knowledge about the client’s network. We gather domain names, IP network ranges, and other information about hosts, such as operating systems and applications. This service may discover new hosts or applications on the network that the client management is not aware of, such as vendor, employee, or partner-added systems.

View our additional IT Risk Advisory services and capabilities

Cybersecurity Resources

Resource Library

Explore our cybersecurity resource library, including case studies, whitepapers, best practices and expert thought leadership.

Learn More >

Our Thoughts On

Schneider Downs’ experts deliver analysis about the cybersecurity trends that impact our clients and organizations of all types and sizes.

Learn More >

contact us

Pittsburgh
Columbus
Metropolitan Washington