Technical Aspects



Internal and external penetration testing

To test the robustness of network perimeter protection

To identify security vulnerabilities that could be exploited by an attacker

To obtain network security recommendations


Application penetration testing

To obtain an overall assessment of the security of your applications

To identify application security flaws (inherent in insecure development practices

To perform an application security acceptance test before going into produc



Configuration audit

For in-depth discovery of technical vulnerabilities (white-box testing)

To determine asset compliance with hardening standards and best security practices


Architecture audit

For in-depth discovery of technical vulnerabilities (white-box testing)

To determine asset compliance with hardening standards and best security practices

Audits & Evaluation

Human Aspect