Systems' and devices' audits
Did you perform penetration tests, and are you still not sure if the security of the factual server or other application platform is sufficient? Do you need to have the security of the key components of your information system thoroughly tested?
The solution to these and other problems is to perform a detailed audit of the factual systems or devices' security within the company's information system.
While performing penetration tests, AEC specialists put themselves in the role of potential attacker. During the technical security audits, they approach the examined component in the role of the system administrator, and implementor of recommended measures for increasing its security. During the individual systems' setting check we take advantage of the knowledge and experience of AEC security and system specialists, producers' recommendations for hardening of the defined systems, etc.
All of the found deficiencies are described in detail in the audit report. There are vulnerability risks described and of course the proposals for their reduction.