Assessments are not all about paperwork, policy, and documentation. Numerous tools can be used to help analyze, assess, and test the network's security infrastructure. Good security will require that funds be spent, but a multitude of excellent open source software products are available and some of them may just suit your needs. Therefore, the goal here is to introduce you to a variety of commercial and open source tools and offer you a high-level overview. These tools have also been divided into categories, because after all, nothing is used in a vacuum.
Note
If you want to know more, the vendor's website is always a good place to start. If you are looking for a real in-depth examination, there are books that have been written about many of these tools. Two good choices are
Hacking Exposed (ISBN: 0072260815)
Anti-Hacker Tool Kit (ISBN: 0072230207)
Introduction to Assessing Network Vulnerabilities
Foundations and Principles of Security
Why Risk Assessment
Risk-Assessment Methodologies
Scoping the Project
Understanding the Attacker
Performing the Assessment
Tools Used for Assessments and Evaluations
Preparing the Final Report
Post-Assessment Activities
Appendix A. Security Assessment Resources
Appendix B. Security Assessment Forms
Appendix C. Security Assessment Sample Report
Appendix D. Dealing with Consultants and Outside Vendors
Appendix E. SIRT Team Report Format Template