Services
Security audits
A complete review of the security of your IT system at different levels. We assess the risk of attack or business interruption in your organization.
We offer security audits:
Configuration security audits
Mobile, web and network applications
Configuration security audits
Using a variety of security testing methods, audit include automatic scans, manual methods, as well as advanced techniques similar to those used in real attacks. This service best suited for large organizations with plenty of data..
Security policy audits
- Mobile, web and network applications
- Android Java, iOS Objective C and React Native
- PHP, JavaScript, ASP, C#, Java, Python and SQL
- C/C++, Java, C#, Python
We identify potential paths you have knowingly or unknowingly made available on the public IP addresses. Each of the available services is examined for vulnerabilities that might enable an attacker to assume control of your machines.
Configuration security audits
- Linux, Unix and AIX systems, as well as Windows and Windows Server
- Microsoft Active Directory
- Network devices (switches, routers, firewalls) from vendors such as Cisco, Checkpoint and Fortinet
- Server applications (including IIS, Apache, Nginx, MS SQL, MySQL, PostgreSQL, Oracle Database, SharePoint, Exchange)
- Virtualisation solutions such as VMware vSphere, Microsoft Hyper-V, oVirt / RHEV
- SAN configuration (iSCSI, FC SAN)
- SCADA Industrial Automation solutions – Wonderware
- BigData-class solutions (Hadoop, Hortonworks, Cloudera)
- Hyper-converged solutions (Nutanix)
- Disaster Recovery Solutions (Dell EMC RecoverPoint, VMware SRM)
- Back-up systems (IBM Tivoli Storage Manager and Veeam)
Security policy audits
- Overall analysis
- Compliance with laws and guidelines
Building on a complete Black Box test, we use multiple, varied accounts such as Administrator, Moderator or any other role. These tests can secure your system from the malicious internal activity and show additional systemic vulnerabilities.
Security audits benefits:
Viable, complete assessment of the level of security
The demonstration of weaknesses requiring immediate attention and secondary problems
Awareness of potential threats and directions of possible attacks
Improvement of the security system