Our Audit practice helps our clients to identify potential risk , namely, Technical Vulnerabilities
through one-off or Persistent Penetration Testing (KEEP-IT-SECURE-24), besides, recommendations and support to mitigate identified issues are provided.
We help our clients to identify their risks and vulnerabilities and also the compliance level of their Information Security Management Practice, so they thoroughly know their risks and be able to address them in accordance with the mitigation recommendations provided by our consultants.
Audit projects are customized according to the needs and aims of our clients. They can be
oriented either towards the technical components, processes, people or more broadly combined
contexts. They can also be oriented to deal with questions related to compliance or regulation.
The kind of projects with higher demand in our Audit practice refers to Penetration Tests, in which our consultants, in order to identify existing vulnerabilities, act as if they were attackers.
Our team provides recommendations to mitigate the identified vulnerabilities. These Audits may be
one-shot or persistent, through the KEEP-IT-SECURE-24 service.
External or Internal Penetration Testing
Persistent Penetration Testing (KEEP-IT-SECURE-24)
Mobile Applications Penetration Testing (Android, iOS or WindowsPhone)
Technical Audit for Gambling Equipment
Penetration Testing of IoT Appliances (Routers, Television, Drones, ...)
Technical Audit/ Penetration Testing of SCADA / ICS networks
Technical Audit Telecom Systems
Source Code Review
Technical Assessment of Architecture / Configuration
Digital Forensic Analysis
Audit / Evaluation of External Suppliers (3rd Parties)
Information Security Management Audit (ISO 27001)
Internal Audit ISO 27001