Audit and monitoring of actual information about protection status of the network, OS, applied SW.
Identification of errors during installation and setting of the equipment and SW.
Control of performance of protection measures used.
Compliance with Federal Law 152, PCI DSS, ISO27001 in terms of the susceptibilities control.
- External perimeter and internal infrastructure scanning.
- Server access to perform deep analysis of the equipment and|SW configuration “from inside”.
- Informative reports with susceptibilities criticality level data and methods of their elimination.
- Scanning history.
- Creation of policies of the infrastructure compliance with standards.
What we offer
- Scanner installation for internal/external scanning;
- Scanner connection to SecurityCenter;
- Setting scanning boundaries;
- Setting of scanning policies and schedule;
- Recommendations of elimination of susceptibilities.