Close

Technical auditing and penetration tests

Vulnerability assessments allow you to check for weaknesses in a piece of equipment or a technical solution.

The objective is to identify the risks linked to a lack of security for the rest of the information system.  To do this we look at the following elements and provide a comprehensive report:

  • Configuration.  How a device is configured can significantly affect its risk profile.  Having a baseline is a great way of making sure all new technology is produced to the same configuration.
  • Patching and versions.  Hardware and software weaknesses are reported via CVEs.  We can check your patch level and versioning to see if any are vulnerable to attack.
  • Security design.  Solutions should be produced according to their design which in turn should have considered some security.  We can check both if your security design requires improvement as well as whether your solutions meet you own security standards.

Scope of intervention :

  • Databases
  • Servers
  • Routers
  • Switches