Overview
Our cyber security scan is a comprehensive audit that scans and analyzes all critical and vital parts of the infrastructure for potential vulnerabilities. The duration of the audit varies, spanning several days depending on the size of the company.
Vulnerability scanning, penetration testing, user awareness campaigns, configuration reviews, endpoint security inspection, ransomware attack simulations,... and all in 1 package!
Not only are vulnerabilities discovered during this audit, but it also confirms that any personal data is protected in accordance with the GDPR. Additionally, it guarantees the effectiveness of your defense measures by testing your firewall and antivirus solution. The result is an in-depth report, a minimum of 100 pages long, written in plain language!
Empower your company's NIS2 compliance journey with this comprehensive assessment! Strengthen defenses, identify vulnerabilities, and ensure a secure digital landscape.
Approach
The audit starts with an external network assessment, during which the company is attacked from the Internet. We try to penetrate the infrastructure coming from the outside without any knowledge, like a real hacker. Websites and web applications are also included; they are tested for known risks mentioned in the OWASP Top 10.
Afterwards, the internal network is assessed. Servers, clients, applications, network and mobile devices are all in the scope of the security audit. Even humans are tested... always a weak link in the security chain!
Report
The report consists of two parts: an executive summary, which includes security scores and potential investments, and a technical section detailing exact findings along with a remediation plan.
Additionally, we can also offer a presentation that outlines all the findings in a personal meeting. These presentations can be organized for IT staff or even for non-technical individuals.
"A 100% Return on Your Investment!"
Related
Included checks
- Vulnerability assessment (internal/external)
- Penetration testing
- Web application scans (OWASP Top 10)
- Email spear phishing campaign
- Active Directory and password audit
- Ransomware attack simulations
- Endpoint security and EDR test
- Firewall configuration review
- Data exfiltration detection
- Privilege escalation test
- Wireless security survey
- Software update compliance test
- Mail flow and mail gateway check
Optional checks
- Web security audit (advanced)
- Extra social engineering campaigns
- Black box testing and red teaming
More info
To request a price quote or for more information, please fill out the form below.