PROTECTION AND DEFENSE OF YOUR COMPUTER SYSTEMS AND NETWORKS’ INTEGRITY
Highly qualified and fully up-to-date regarding cybersecurity problematics, our Computer Security Operations team will perform pentests, organisational and conformity audits on your infrastructures. Ready and willing to support you in your ISSP (Information Systems Security Policy) implementation, our experts will work towards heightening the awareness regarding cybersecurity threats and corporate espionage in your company’s key actors. Furthermore, they will be available around the clock to support you in case of an attack or intrusion on your systems and networks.
CYBERSECURITY AUDIT
Pentest, blackbox/whitebox, website and app audit
INCIDENT RESPONSE
Post-intrusion audit
SECURITY ON SCADA SYSTEMS AUDIT
Pentest on industrial environment
DIGITAL SUPPORT FORENSIC ANALYSIS
Storage devices, (hard drives, SSD, landlines and smartphones, tablets, GPS, CCTV)
TECH SUPPORT
Precautionary measure, data seizures