What they are?
Safety assessments should never be ignored by any company that wants full security. In fact, these assessments are the critical part that allows the company to identify nonconformities in cyber systems under its own management and in other components that need improvement.
Aside from providing thorough audit reports, we have specialized in performing a technical analysis of the weaknesses identified, by conducting a review in ‘the real world’. This analysis of a potential attacker includes real-life scenarios by our team of professional experts in cyber security. This is done by simulating what an experienced attacker might be able to threat in data networks and computer systems (servers, routers, switches, firewall, websites, etc.)
Recommendations
Before starting penetration tests on data networks or on computer platforms, our clients will have sufficient time to back-up any important data, logs, files. Tests will be scheduled together with the client to ensure that any potential disruption to the system is kept at a minimum.
Duration of tests
The duration of our tests depends on the coverage of data networks and computing platforms. Generally, it can last from a couple of hours to several days. The technical analysis of the penetration test results and the final assessment report can take between five and ten days.