RISK ANALYSIS

RISK ANALYSIS

Conduct a risk analysis, controls and countermeasures in the network and the company’s systems. Revision and updating of security policies.

DEPLOYMENT OF SECURITY TOOLS

DEPLOYMENT OF SECURITY TOOLS

Incorporation of new applications or security functions such as firewall, IPS, Internet filtering and encryption. We advise you in all stages; Validation and definition of architecture, choice of suppliers, installation and configuration, user guides and operator training.

COMPUTER FORENSICS

COMPUTER FORENSICS

Digital survey of an event through the following stages: data collection, analysis and presentation of results. Internal harassment, fraud, theft of data, but also external threats (infection and fraudulent access).

NETWORK SECURITY

NETWORK SECURITY

Securing your network perimeter and a good segregation of assets is essential. Risk levels and control requirements vary by area; WAN, DMZ, Intranet and VLAN. The continuity of your business depends entirely on the availability of the network.

EVALUATION

EVALUATION

Evaluation of the level of security across the various tasks of network operation and systems of the company. Definition of a confidence index in the face of a computer disaster (procedure for managing backup incidents, revision of mechanisms for updating software vulnerabilities)

SENSITIZATION

SENSITIZATION

Sensitize employees to safety in the company. Learn to detect them and guard against threats: fraud, hacking, phishing, information theft, malicious infection.