logo

How does Audit Square work?

  • If you do not have an account yet, choose Start 30 days Trial

  • During the registration choose whether you want your reports to be processed in EU or US data centre.

  • After the registration you will see your dashboard. The next step is to download Audit Square Client for MS Windows.

  • To start the Client you need Administrator privileges. After starting the Client choose on-line mode and log in with your credentials (email + password you have chosen during registration).

  • After you start the audit, the data collection and report processing takes place (approx. 2-8 min). In cloud version the processing is done on Audit Square servers - in EU or US data centre. If you prefer on-premise version see mode info below.

  • The final audit report is ready for you as a professional PDF file.

  • We are also able to create reports in MS Word and MS Excel formats, you can edit them if you need to.

  • All reports are also stored on the portal for your future needs.

Supported platforms

We support:

  • Microsoft Windows 2000, 2003, 2008(R2), 2012(R2), 2016, XP, 7, Vista, 8.x, 10
  • UNIX platforms coming soon

We provide 3 main security baselines (High, Standard, Minimal security), we offer also a set of baselines related to special regulations like HIPAA, PCI DSS, ZoKB etc. You can also create your custom baseline.

You can easily check a PDF sample report to see how thorough our assessments are.

Cloud or on-premise

We are aware that some customers prefer not to send any data to a cloud service, therefore we provide also an on-premise version.

It is distributed as a virtual appliance which you can simply download and deploy on your VMware virtual infrastructure.

You can find more details in our advisory.

Assessment modes

Audit Square is able to handle:

Audit Square is ready for external audits (external auditors or consultants) as well as internal audits (internal IT security auditors or experts).

Security of Audit Square

We have designed and built Audit Square infrastructure utilizing a strong security background of our parent company (see DCIT services).

  • Our application development utilizes the OWASP secure coding guide.
  • All communication is strictly over SSL/TLS or SSH/SCP (no exceptions).
  • User passwords stored as one way salted verifiers (SRP + PBKDF2).
  • We strictly avoid collecting any sensitive information.
  • On top of encrypted communication the audit data are double-encrypted with RSA-4096 + AES-256-CBC + HMAC-SHA256.
  • Abuse/intrusion detection with automated intruder blocking on all front-ends.

Get your FREE 30 days trial licence right now!

Start 30 days trial