On-demand and continuous security audits
-
The audit report presents an analysis of the results and determines the level of risk (scored out of 10) of each penetration vector, along with proposals to correct them.
-
Correct the flaws at your own pace and in your own way, and contact us for verification or if you need assistance.
-
The counter-audit report serves as proof that the GDPR computer security measures are properly implemented.
Blackbox audit
A “blackbox” audit scans your public zone with tools specialised in the languages and protocols of the services (HTTP, DNS, SSH, …) exposed on the public network (internet).
The aim of such an audit is to identify attack vectors through the public network and geographical zone (internet, public places) before a malicious hacker exploits them for criminal reasons, to the detriment of the company, within the framework of remote attacks and gadget infiltration operations.