Services we specialize in:
Our cybersecurity services include information security audit, penetration testing, source code security analysis, computer forensics, security incident response and handling, implementation of ISO27k / VDA ISA / TISAX / GDPR / HIPAA, consulting, training and security awareness measures, custom software development on demand.
Our Services
Information security audit
Why do you need the audit?
Security audit gives you the understanding of how good is your information system protected from the external and internal threats. Regular audit will let you keep your information security system on a proper level, timely reveal the potential problems, control the execution of security policy rules in your company.
What types of security audit do we offer?
Penetration testing – reveals the vulnerabilities of your company’s Internet resources from outside. We check your servers (websites, FTP, email etc.) connected to the Internet, detect the weak points and configuration errors, safely exploit the vulnerabilities using the same methods as hackers to obtain the unauthorized access to sensitive information.
Internal security audit – needs physical access of the auditors to the company’s resources. Our experts will interview the managers of all levels, research the business processes of the company, the structure of its information systems, rules of access restriction and internal documentation regulating the ways of critical information handling and processing. Then we test how well is the system protected from internal threats, check the configuration of the servers and local computers, the software installed, updates and patches, effectiveness of antivirus, antispyware and firewalls. Also we verify the backup strategy, methods of information storage and safety from unexpected intrusions.
Software security analysis – helps the software vendors estimate the security of their products. We analyze the websites, content management systems, instant messengers, VoIP software and any other client or server-side programs where the information protection and reliability is one of the most important criteria. We may perform the audit in both white-box and black-box modes. When analyzing a white-box, we thoroughly test the executable files along with their source code. This approach allows us to reveal not only the program’s vulnerabilities, but also the errors in design, coding and algorithms implementation. When we test a black-box, we do not have source code. We just verify the executable files and the same installation package as the end-user receives.
The result of all above audits is being delivered in the form of detailed report with our experts’ recommendations on how to eliminate all found problems and vulnerabilities.
Why the security audit should be performed by independent experts?
Your in-house specialists responsible for the information security in your company must regularly check the results of their work within their competence and within certain restrictions in permissions and resources they have. The independent experts are looking at your system from outside with fresh eyes relying upon the huge knowledge base they have collected while performing the security audit for many different companies for years. The external auditors give an actual unprejudiced estimate of the current state of information security in your company.
Cybersecurity training and awareness measures
We offer training of your staff in the following topics:
- Information security of the business
- Competitive intelligenceand social engineering
- Protection from computer methods of industrial espionage
- Protection of critical assets of the organization
- Protection of personal data
- Training of police and law enforcement bodies in cyber security and investigation of cyber crimes
- and other topics upon your request.
IT security consulting
Our company will help you develop the information security policy from a scratch. We will research your business needs, make a project of your whole IT system if needed, and suggest the protection measures, tools and policies. We can supply the software products from world leading vendors, develop own products on demand and build really strong complex solutions to prevent leakage of sensitive information, external and internal attacks.