Security Assessment

Security Assessment consists of issue identification, and aims at finding all the possible weak points on the IT system. The analysis must be quick, well organized, ongoing and technically up-to-date. The documentation resulting from these activities is a detailed analysis of the diagnosed threats in the whole environment (network, servers, clients, applications, procedures, processes, etc.). The analysis is then communicated in a different report according to the receiver's charge, and the type of threat found in the whole IT environment (networks, servers, clients, applications, procedures, processes, etc.)

The information related to the assessment activities allows to plan interventions, to inhibit the causes of the possible intrusions, to blunt the potential vectors of attacks, and, mostly, it allows to confine the incident's impact on security. A complete Security Assessment on the enterprise level must measure objectively all these evidences.