We advise you within a few days regarding your IT security. The service includes the analysis of the current situation, a detailed report with concrete suggestions for improvement as well as the corresponding presentation.
We will be happy to take your individual requirements into account in our customized offer.
What is tested?
- Infrastructure and network
- Data and information security
- Terminal devices
- Cloud solutions
- Security governance
- Permission and access management
We’d be delighted to take your individual requirements into account in our custom-made quote.
In the following, we will show you how an assessment normally works and which processes we go through in the process
a. Recording your needs
2. Identifying security vulnerabilities
Checking your systems for vulnerabilities
3. System and architecture review
Based on interviews, reviewing documents and checking your systems
4. Vulnerability report and action plan
Preparing a vulnerability report and a corresponding action plan as a management summary
Verifying the results found once the measures have been implemented
Example of a graphical representation of the presentation of results