Security assessment (external)

The internet is continuously "scanned" and the results of this can often be found in public sources. During this research, we will dig into this in order to map out the "exposure" of your organization from a security perspective.

We use the OSINT-Framework. We will search the internet for information related to your organization, about systems, people, documents, backups, passwords, archives and so on.

Working method

Our investigations into external enterprise networks go through these phases:

Converstation
We start with a discussion about the collaboration and test approach.

Examination

We look for sensitive information related to your organization in various public sources.

Documentation
We document our findings and personalized advice in a comprehensive test report.

Handover
We hand over the report, discuss the main points with you and think along about pragmatic solutions.

Next steps
We will discuss possible follow-up steps with you. We also recommend a "Internal Investigation".


Aftercare
We remain available to you for questions, retests and advice.

Ethical hackers die samen naar een kwetsbaarheid kijken

Investment

No organization is the same, and the same applies to the information that can be found about it. Therefore, a security investigation into your public 'exposure' is always custom-made.

Of course, you can limit the scope of the investigation to control costs. We would be happy to provide you with more information.

Getting started

Do you want permanent assurance about the secure setup of your servers or sites? Contact us now for a non-committal introductory meeting.

Contact us