Vulnerability testing

Vulnerability testing

An IT security policy includes many aspects, such as:

  • Secure access to the network
  • Workstation and server updates to address new vulnerabilities and attack techniques
  • Passwords and access rights
  • Authentication of interlocutors
  • Internal company rules of use
  • Legal constraints
  • External vulnerability testing

Aims to identify flaws visible from the Internet

Analysis from the internet of public IP addresses such as access router, firewall, WEB server, mail, FTP. Method applied: OSTMM by a certified engineer. Generation of a report mentioning the vulnerabilities found, and solutions to overcome them. A periodic vulnerability test service will allow you to be warned as soon as your network is in danger.

Internal vulnerability testing

Allows you to identify vulnerabilities that can be exploited from the Internet, and to determine internal vulnerabilities. Analysis from the inside (LAN, DMZ, Wifi) of sensitive IP addresses, such as servers with published services (WEB server, mail, FTP) and other systems such as ERP, LDAP or Active Directory, or any equipment of strategic importance.

Applied method: OSTMM by certified engineer.

Generation of a report mentioning the vulnerabilities found, and solutions to overcome them. WiFi security and coverage analysis The use of WiFi network in a professional environment requires security, performance and
reliability. The WiFi analysis includes access point discovery, security verification through intrusion attempts and WEP/WPA key breaking, access management, throughput measurement and coverage.