- The activities are performed from outside and/or inside of the network.
- The test employs commonly available and commercial (e.g. Nessus) security scanners.
- It allows the detection of obvious vulnerabilities and weaknesses of the infrastructure.
- It provides an overview of the network from the external perspective of the Internet and of potential attackers.
- The client receives a report based on the collected results, verified and analyzed by the auditor.
Do you have questions about the service or do you need a personalized offer? Email us with questions.