With our vulnerability management you have an efficient opportunity to identify, analysis and evaluate possible IT weak points. A vulnerability scan supplies essential knowledge for the evaluation of the current risk situation and the effectiveness of measures which have already been taken. Our penetration tests provide a reliable assessment about the security status while considering all the factors which could influence security: applications, systems, networks and users.
Our approach will cover:
- Architecture Review
- Information Gathering
- Check of applications and IT systems
- Check of Clients, e.g. PC, Notebook, Tablet and mobile phone
- Wireless and wired network check
- E-Mail- and Internet-Malware test
- Internal and external Penetration Tests
Our experienced and certified ISO 27001 Lead Auditors provide you with high quality advice on information security management (ISMS) and support you with the roll-out and streamlining of ISMS based on ISO 27001.