Cyber Security services

Assess the technological infrastructure against potential attacks

Some numbers to understand what your organization is risking

195 €

The estimated cost from the Ponemon Institute for every lost record.

35%

Increased negative feeling around a brand following a data breach.

57%

Increased cases of cyber espionage in the world in 2018 compared to the previous year.

REQUEST FREE QUOTE

Get now a free quote of Cyber Security services.

Overview of Cyber Security services

Vulnerability Scan

Vulnerability Scan allows you to check for flaws in the computer system and evaluate the reliability of the network or host.

In summary, one or more machines are remotely analyzed to determine if they are vulnerable to known attacks, and therefore potentially exposed to being violated by crackers.

Vulnerability Checks available:

  • Vulnerability Scan for Website,

    Detection of web server configuration and website programming errors.

  • Vulnerability Scan for e-Commerce,

    Identification of weaknesses and errors in the configuration of the web server and in the programming of an e-commerce site.

  • Vulnerability Scan for Web Application,

    Detection of configuration errors and weaknesses of a Web Application.

  • Vulnerability Scan for Router or Firewall (public IP),

    Detection of configuration errors of a Router or a Firewall.

  • Vulnerability Scan for Web Servers (or remotely Reachable Servers)

    Detection of configuration errors of a Web Server or Server that can be reached remotely.

Vulnerability Check

Vulnerability Check is an integrated Vulnerability Scan with a risk assessment of potential damage that could result from a hypothetical attack on that system.

It concludes with a detailed report that sets out:

  • the types of vulnerabilities identified,
  • the damage that the customer may suffer in the event of an attack,
  • and finally, how to solve the problem.

Vulnerability Checks available:

  • Vulnerability Check for internal Servers and PCs (at the customer’s premises),

    Detection and verification of internal Server and PC configuration errors.

  • Vulnerability Check for Devices,

    Detection and verification of configuration errors of the devices used by the company (Router, Firewall, Printers, etc.).

  • Vulnerability Check for Patch Audit,

    Detection and verification of updates needed for PC and Server.

PENETRATION TEST

A Penetration Test is a real simulation of an attack on a real system or computer network.

It allows to establish what is the resistance of the computer system compared to the attacks received.
The test is divided into phases in order to highlight the weaknesses and vulnerabilities of the system.

The main phases of a Penetration Test are:

  • Information gathering.

  • Detection and scanning.

  • Assessment of the vulnerability.

  • Drafting Report.

Penetration tests available:

  • Penetration test for internal servers and Pcs (in premises inside the customer's offices)

    Simulation of a real attack on a computer system or network in real conditions to determine what is the resistance of the computer system compared to the attacks received.

ADDITIONAL SCANS AVAILABLE

Upon request, further scans can be performed, such as:

  • Badlock Detection
  • Bash Shellshock Detection
  • DROWN Detection
  • Intel AMT Security Bypass
  • Shadow Brokers Scan
  • Spectre and Meltdown
  • WannaCry Ransomware

Contact us for more information on each scan.

Our certifications

The phases of a Penetration Test

01. Gathering Information

The Gathering Information is the most important phase of an engagement penetration testing. The information gathered in this step is used by the penetration tester to perform an attack on the corporate network.

02. Footprinting e Scanning

It is the infrastructural part of Gathering Information. Remotely identifying operating systems, server and client applications is of fundamental importance to broaden the attack surface and prepare for Vulnerability Assessment and exploitation activities.

03. Vulnerability Assessment

The Vulnerability Assessment is a process by which a penetration tester discovers all vulnerabilities in a computer system or an application. After the vulnerability recognition phase, a series of attacks are carried out (Web, System, Network) aimed at verifying any known gaps, exploits or vulnerabilities.

In particular, techniques such as: Traffic Sniffing, Burping, Scanning and Os Fingerprinting , Nessus , Cross Site Scripting, SQL, Password Cracking, Metasploit etc. will be used.

04. Report

The final phase leads to the drafting of a detailed report with all the activities carried out, the vulnerabilities that emerged and how they manifested themselves.

PENETRATION TEST AND VULNERABILITY ASSESSMENT SERVICES

ENTERPRISE OFFERS ADVANCED PENETRATION TESTING AND VULNERABILITY ASSESSMENT SERVICES THAT ALLOW YOU TO ASSESS THE SECURITY OF AN INFRASTRUCTURE AND IT APPLICATIONS AND THE ABILITY TO PROTECT FROM IT ATTACKS.

Find out on this page the main information of the services or request more information immediately or a free quote on the side.

REQUEST FREE QUOTE OF CYBER SECURITY SERVICES

Get now a free quote of our Cyber Security services.

Cyber Security services FAQ

Even if you have an IT department within your company to implement the security system, it is still better to allow an impartial third party to check the infrastructure itself.
An unbiased assessment ensures that invaluable information is acquired for the network administrator and allows a more truthful simulation of an external attack.

Yes, we can check as many IP addresses as you like, as long as they belong to you. We will not check any third-party IP addresses.

Yes, it is completely safe, Enterprise engineers probe your network from outside your organization.
However, should be there be any problems. It is best to happen in a controlled environment of your network vulnerabilities, some of which could indicate that your business may be defenseless from attacks on your security.

Do you need a complete Log Management Suite?

FIND OUT BUSINESS LOG