Snapshot of your IT security situation
In most cases, the customer is aware that security problems exist in his infrastructure. Weak point analysis is the right tool to identify and prioritise these problems.
A weak point analysis is always only a snapshot of the IT security situation. Therefore, the IT infrastructure should be subject to regular checks. For example, it is possible that a human error or the installation of software could lead to a new serious security problem once the vulnerability analysis has been completed.
During a weak point analysis, the system searches for vulnerabilities using automated and manual checks. In the first step, the automated scans provide a good overview of the vulnerable systems. However, the results must be checked for so-called ‘false positives’. For this reason, we perform a series of manual checks to verify the test results and eliminate those false positives. Upon completion of the tests, you will receive a report with all security problems found. We will give you a suggestion on how to solve each security problem. On request, we can also provide technical support for troubleshooting.