High Tide evaluates systems, applications, and networks for security vulnerabilities that are most likely to be compromised by outside entities. The analysis includes a determining which vulnerabilities are most serious. HT’s vulnerability assessment services uncover deficiencies of security policies based on actual methods that may be used by data thieves. In addition to determining deficiencies, HT also provides recommendations to improve security. Deficiencies are prioritized based on risk, probability of occurrence, and the potential disruption.