Internal Investigation

During the execution of this security investigation, we map both the internal (on-premise) and cloud (Intune, Azure, Google, etc.) enterprise network.

We deploy vulnerability scanners and semi-automated tooling to identify vulnerabilities in the infrastructure and provide pragmatic advice and suggestions on how to protect them. It is recommended to perform the  "External Investigation" first.

Investment

Complexe applicaties met bijvoorbeeld veel koppelingen vragen meer analyse dan eenvoudige toepassingen. Een beveiligingsonderzoek voor een webapplicatie inclusief server is daarom altijd maatwerk.

Natuurlijk kunt u de scope van het onderzoek beperken om kosten te limiteren. WIj informeren u hier graag over.

Aan de slag

WIlt u permanente zekerheid over de veilige inrichting van uw servers of sites? Neem dan nu contact met ons op voor een vrijblijvend kenninsmakingsgesprek.

Contact us

Working method

Our investigations into internal enterprise networks go through these phases:

Conversation
We start with a discussion about the collaboration and test approach.


Examination
We test the security of all machines in your enterprise network, such as servers, workstations, but also printers, VoIP and LAN/WiFi networks. In addition, we check different configurations (firewall, switch) and look for attack scenarios from a malicious perspective. We perform these tests at your location or via a VPN connection.

Documentation
We document our findings and personalized advice in a comprehensive test report.

Next steps
We hand over the report, discuss the main points with you and think along about pragmatic solutions.

Aftercare
We remain available to you for questions, retests and advice.