IT vulnerability assessment
Web applications, vulnerability identification of WiFi networks, routers, servers, infrastructure. These vulnerability assessments (penetration test) are implemented in order to determine the technological information security vulnerabilities of the organization, resulting the risk of normal operation of the organization, and to offer possible measures of prevention.
IT Risk Assessment
IT risk management techniques, adaptation of the required policies, IT risk assessments. The scope and depth of risk assessment differs for each organization. It depends on the organization's activities, information values, experience in the field of organizing information security and financial resources. Despite this, to achieve the optimal result, it is necessary to take into account the specific needs of the organization and situation altogether.
We can help to prepare and certify for various IT security standards, such as from ISO/IEC 27001 to ISO/IEC 27005, ISO/IEC 27035, PCI DSS (Payment Card Industry Data Security Standard). We also carry out assessments before the official primary and/or multiple official certification.
IT Due Diligence
Detailed company's IT examination, which is usually carried out by investors (or their representatives) before purchasing shares of the company or making a merger. This check is carried out to ensure the data correctness and determine the company's stock value.