Part of our security portfolio is a comprehensive security audit, which includes all elements of the enterprise information architecture, including processes. The service is supplemented by organisational perimeter mapping and risk qualification. An assessment of compliance with legislative requirements is also a matter of course.
Depending on the type of organisation and systems used, we perform dynamic and static tests of "web and non-web" applications supplemented by penetration tests. With regard to the importance of data protection, we process a comprehensive analysis of the risks arising from the degree of visibility of the organisation on the Internet, and quantification of the risks of attacks or data leakage, using social engineering methods.
As part of security analysis we use modern tools, including advanced network monitoring based on NetFlow, thanks to which we can detect otherwise practically undetectable anomalies in the initial stages of cooperation.