A complete review of the security of your IT system at different levels. We assess the risk of attack or business interruption in your organization.

We offer security audits:

Using a variety of security testing methods, audit include automatic scans, manual methods, as well as advanced techniques similar to those used in real attacks. This service best suited for large organizations with plenty of data..

  • Mobile, web and network applications
  • Android Java, iOS Objective C and React Native
  • PHP, JavaScript, ASP, C#, Java, Python and SQL
  • C/C++, Java, C#, Python

We identify potential paths you have knowingly or unknowingly made available on the public IP addresses. Each of the available services is examined for vulnerabilities that might enable an attacker to assume control of your machines.

  • Linux, Unix and AIX systems, as well as Windows and Windows Server
  • Microsoft Active Directory
  • Network devices (switches, routers, firewalls) from vendors such as Cisco, Checkpoint and Fortinet
  • Server applications (including IIS, Apache, Nginx, MS SQL, MySQL, PostgreSQL, Oracle Database, SharePoint, Exchange)
  • Virtualisation solutions such as VMware vSphere, Microsoft Hyper-V, oVirt / RHEV
  • SAN configuration (iSCSI, FC SAN)
  • SCADA Industrial Automation solutions – Wonderware
  • BigData-class solutions (Hadoop, Hortonworks, Cloudera)
  • Hyper-converged solutions (Nutanix)
  • Disaster Recovery Solutions (Dell EMC RecoverPoint, VMware SRM)
  • Back-up systems (IBM Tivoli Storage Manager and Veeam)
  • Overall analysis
  • Compliance with laws and guidelines

Building on a complete Black Box test, we use multiple, varied accounts such as Administrator, Moderator or any other role. These tests can secure your system from the malicious internal activity and show additional systemic vulnerabilities.

Security audits benefits:

Want to get more information?

Our specialists are eager to help you out!