We cover a wide technical scope, with specific tests foreach type of target
We work on websites as well as on your APIs, heavy clients or mobile applications for example. Audits can be done in a white, gray or black box
To test your security in depth and to assess the level of reaction of your SOC, we can carry out realistic end-to-end campaigns: from reconnaissance to proof of recovery of the most important data.
Evaluate the level of security of one of the most important building blocks of your IS: your internal network. Active directory, Azure, Office...
Taking an increasingly important part, we can support you on Cloud configuration audits: AWS, Azure, GCP or audits of your cloud applications.
Get help in the event of an intrusion into your network. Our experts can be mobilized quickly to analyze the threat, trace the attack and support you in your computer and legal procedures.
We take into account all of your expectations to advise you on the solution best suited to your needs. Security is a subject that every company, whatever its size, must integrate into its processes. We are here to advise you, test your implementation or your new projects in relation to current standards.
Step 1
Each mission begins with a project presentation meeting. The goal is to define the scope and present the prerequisites.
This first step is to understand your expectations and the specificities of your project. We then adjust the criticalities according to what can impact you the most.
Step 2
The auditor in charge of the mission takes care of testing your scope and stays in direct contact with you. We directly tell you about the most critical vulnerabilities without waiting for the audit to complete.
Step 3
The end of the mission concludes with a presentation of the results and vulnerabilities. The auditor presents the impacts of each vulnerability for your business, and answers all questions.
Our detailed report allows you to replay attacks, and deeplyunderstand the remediation to correct the problems.
Thereafter, we remain available in case of questions about the report or the vulnerabilities.
As we have understood, the idea that security begins and ends end
with buying a pre-packaged firewall is simplyerroneous.
– Art Wittman