GDPR Security Scan

Overview

Our GDPR security scan is a complete security audit that scans and analyzes all critical and vital parts of the infrastructure for potential vulnerabilities. The audit is spread over several days, for a fixed price, depending on the size of the company. Vulnerability scanning, penetration testing, social engineering, configuration reviews, endpoint inspection,... and all in 1 package!

Not only vulnerabilities are discovered during this audit; it also confirms that any personal data is protected, corresponding to the GDPR or General Data Protection Regulation. In addition, it guarantees that your defense measures are working effectively, and protects against different threats - like hackers and malware - by testing firewalls and antivirus systems. The result is a comprehensive report, with a minimum of 100 pages and written in own words!

Approach

The audit starts with an external network assessment, during which the company is attacked from the Internet. We try to penetrate the infrastructure coming from the outside without any knowledge, like a real hacker. Websites and web applications are also included; they are tested for known risks mentioned in the OWASP Top 10. Afterwards, the internal network is assessed. Servers, clients, applications, network and mobile devices are all in the scope of the security audit. Even humans are tested... always a weak link in the security chain!

Report

The report consists of two parts: an executive summary, including security scores and possible investments, and a technical part, including the exact findings and a remediation plan. We also provide a presentation, outlining all the findings in a personal meeting. Presentations can be organized for IT staff or even for non-technical people. "100% Return on Your Investment!"
 

Related

Included checks

  • Vulnerability Assessment (LAN/WAN)
  • Penetration Testing (LAN/WAN)
  • Web Security Test (OWASP Top 10)
  • Active Directory and Password Audit
  • Software Update Compliance Check
  • AV Test and Endpoint Inspection
  • Firewall Configuration Review
  • Data Exfiltration Detection
  • Mail flow and Gateway Check
  • Privilege Escalation and Pivoting
  • Wireless Security Survey
  • E-mail Phishing Campaigns

Optional checks

  • Web Security Audit (Advanced)
  • Malware and Botnet Detection
  • Social Engineering Campaigns

More info

To request a price quote or for more information, please fill out the form below.

CAPTCHA
This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.
2 + 0 =
Solve this simple math problem and enter the result. E.g. for 1+3, enter 4.