Services

Penetration Testing

Our team simulates a real world attack in a controlled and professional fashion on the client infrastructure and applications to demonstrate the real security level and provides guidance on how to resolve the detected vulnerabilities.

PCI ASV Vulnerability Scanning

External Vulnerability Scanning to validate adherence with PCI DSS Requirement 11.2.2. The added value in this service is the validation of the vulnerabilities detected by the ASV Scanner Tool and provide the evidence for the resolution of false positives findings.

PCI DSS & PCI PA DSS Gap Analysis

Our experts will review your processes and systems and provide you with a detailed report showing your current compliance status and advise on the solutions to achieving PCI DSS or PA DSS compliance.

Security Design Review

Security focused evaluation of your IT environment, from an architectural, operational and management perspective aligned to ISO/IEC 27001 and best practices.

Cybersecurity Maturity Assessment (in depth : 40 hours )

The goal of this assessment is to provide a view of your current security posture and will also
help your organization develop tactical and strategic directions to further mature and
strengthen your security program efforts This assessment is a mix of a quick gap analysis of
cybersecurity best practices and vulnerability assessment that benefit organizations of any size.
The assessment consists of remote phone interviews, vulnerability assessment of your critical
hosts exposed to Internet, a review of policy documentation and a analysis of implemented
security solutions
The report will contain summary of the information obtained, identified gaps and focus areas,
detailed technical report about network and vulnerabilities, observations of our cibersecurity
experts and a roadmap with prioritization of remediations for your organization.

Cybersecurity Maturity Assessment (light: 12 hours )

The goal of this assessment is to provide a view of your current security posture and will
also help your organization develop tactical and strategic directions to further mature and
strengthen your security program efforts This light assessment is a quick gap analysis of
cybersecurity best practices.
The assessment consists of remote phone interviews and vulnerability assessment of your
critical hosts exposed to Internet.
The report will contain summary of the information obtained, identified gaps, detailed
technical report about network vulnerabilities, observations of our cybersecurity experts
and a roadmap with prioritization of remediation for your organization.