SECURITY AUDITS
Security audits related to the security of information systems, networks and protection of processed data may be related to the requirements of the organization, but also to the requirements of law and regulatory authorities. Our audit team will provide internal, external and customer audits in your company or with your customers in the sense:
- ISO/IEC 27001 standards
- ISO/IEC 20000-1 standards
- ISO 22301 standards
- and the laws
GDPR AUDITS
- internal audits - assessment of the existing state and compliance with the requirements of the law
- customer audits - assessment of technical and organizational measures with GDPR Regulation and the agreement on the processing of personal data drawn up between the controller and the intermediary
AUDITS
- internal audits - performing an internal audit and subsequently preparing an audit report
- customer audits - performing a customer audit and subsequently preparing an audit report
- external audits - performing an external audit and subsequently preparing an audit report
PENETRATION TESTS
Can you face the hacker attacks? Do you think that you are adequately protected from these risks? We offer you tests that verify the resilience of your systems and services provided. Penetration tests are performed by specialized software and manually by audit specialists.
BASIC
A basic test of network services that tests the security of access points from the Internet. It is ideal for testing and securing access points from the public Internet access network (WAN) to the LAN.
HARD
+ test web applications and services running on servers.
By mutual agreement, penetration tests can only be performed on a specific network device.
By mutual agreement, penetration tests can only be performed on a specific network device.
INDIVIDUAL
Individual analysis of the resilience of provided services according to customer requirements in the environment of LAN and WAN networks. Testing is performed using specialized software but also by manual analysis.
By mutual agreement, penetration tests can only be performed on specific network devices.
By mutual agreement, penetration tests can only be performed on specific network devices.