Network Security Audit
Identifies security vulnerabilities in networks and devices accessible from the Internet, as well as internal servers.
VLAN, Active Directory, file-sharing servers,
firewalls, VPN, DNS, Proxy, FTP […]
Cloud Security Audit
Identifies unsafe configurations and exploitable security vulnerabilities within your cloud environment.
Microsoft Azure, Amazon Web Services (AWS), Google Cloud (GCP) […]
Web Security Audit
Identifies unsafe development practices & exploitable vulnerabilities within your web applications.
Java, PHP, .NET, Angular, React, Vue, Python, Ruby, WordPress, Joomla, Typo3, REST, Ajax […]
SCADA Security Audit
Identifies security vulnerabilities and unsecured configurations of your SCADA / ICS industrial networks and equipment.
Industrial Networks, Segmentation IT/OT, PLC, IOT, RTU, HMI, […]
IoT Security Audit
Security audit of your connected equipment and your smart devices to identify exploitable security vulnerabilities.
Smart vehicles, smart locks, monitoring devices […]
Measures the level of awareness of your employees about the risks of email phishing and provides statistics on your company's risks.
Advanced phishing campaign, targeted phishing […]
They trust us