A comprehensive network security architecture must not only be well conceived but must be continuously tested to ensure that the design goals are always being met. Vendor vulnerability compliance, device configurations, protocols allowed, port access and a litany of other design elements must be checked to assure that what is expected is in force. In this demo, we will show the importance of continuous assessment of these conditions for protecting sensitive data, maintaining operational integrity, and safeguarding your organization’s reputation and future.