Security audit ICT

Security of the ICT contains a wide range of questions and matters regarding not only the area of information technologies but also other areas of an organisation that are directly connected to many other processes and activities. Within the frame of the audit an evaluation of the organisational and technical procedures related to security is carried out. As a result we suggest mechanisms improving the current measures and upgrading them to a necessary level.

We are ready to provide professional and complex services in the area of security. We believe that you find what you need in the following portfolio of our services.

Risk Security Assessment
Assessment of risks and weak points in the environment of the customer followed by design of a procedure leading to their elimination. We use various methods and procedures of analysis according to needs of the operative environment of the customer. This service includes also the evaluation of the technological environment of informational technologies of the customer. As a result we suggest concrete technical measures and an increase of security of the operating technical elements.

Penetration Testing
Within the Penetration Testing a possibility of penetration into the net of the customer is tested. We also test the penetration into key IT components from the internal net of the organisation. For testing we use automated tools and processes according to verified international methodologies.

Standards Comliance and Policy Development
Design of all kinds of security policies and other following documents dealing with the matter of security in the organisation. We focus on required international standards, particularly on ČSN/ISO 17799 and 13335.

Integration Security Services
Securing the required security can be realised only by the right application of verified processes of system integration in the whole life cycle of the information system. The security is not being solved separately from the IT but is a part of the security integration.

Emergency Response and Forensics
Complex support of the restoration of IT components in case of an accident, elaboration of plans of functional restorations and securing the technical resistance of the infrastructure.

Security Technology Best Practices
Implementation of best practices from the area of security into the current architecture of the IT of the customer. There is no need to discover procedures that are already verified by practice.

Security Testing
Within the Security Testing our customers may use the chance to test applications under development for security weak points, to test the actives for their resistance to various types of attacks and other specific forms of testing.

bit421@bit421.com

d'abraka design © 2006

If you wish any other information, please, contact us.