Our expertise


Security Audit

With nomadic users and teleworking, how can you ensure that only your own colleagues will have access to your company’s data? How can you ensure that no malicious person does not usurp the identity or the password of a colleague? How to ensure that only your colleagues have access to your business information? How to protect the bounderies of your company, when they are no more clearly defined?

A security project implemented by ASSYST EUROPE always responds to at least three essential criteria : Availability – Integrity – Confidentiality.

  • Availability: The system operation has to be flawless during scheduled time.
  • Integrity: The information concerned must be accurate and complete.
  • Confidentiality: Any unauthorized access must be prevented.

04_Security

Our services

SECURITY AUDITS

Global risk assessment – DRP – Vulnerabiity testing –Testing intrusion– Social engineering – Denial of service – Identity fraud – Confidentiality – Audit on all aspects of the information security: physical, technical, organizational, legal, human.

AUDIT ISO 27002

Audit on all aspects of the information security: physical, technical, organizational, legal, human. Flow mapping, analysis of data exchange flows, links between partners. Research for compromise between security and working conditions.

WEB AUDIT

Vulnerability Assessment of a website or of any accessible sensitive application on the Internet. Audit prior to going on-line and deployment. Internet access audit from a local network or multisites, traceability, DDOS.

INTERNAL NETWORK AUDIT

Attempt of listening to your LAN network (cable and WIFI). Attempt to access the key servers. Detection of single points of failure and vulnerability management in the event of an atttack or technical failures. Recommendations.
Drafting and submission of test reports. Recommendation for RSSI or ISO 27002 certification.

EXTERNAL NETWORK AUDIT

Measuring the resistance of your external network security, the degree of difficulty of access, stealing and/or destruction of sensitive information. We have a wide range of methods of intrusion detection. Tests based known operating methods of intrusion or tests based on methodology of non-listed intrusions. Simulation of realistic attacks (including attacks caused by denial of service).
Drafting and submission of test reports. Recommendation for RSSI or ISO 27002 certification.

AUDIT OF IT CONTINUITY PLAN

Risk mapping. Defining of the business continuity plan (BCP). Activity continuity plan. Management crisis procedure. Distribution of roles. Operation in degraded or partial mode.
Drafting of procedures on IT management, executive committee or ISO compliance.

Relevant technologies

  • ISO 27002 150x150
  • CISCO 150x150

Our references

  • APRAGAZ-150x150
  • CNCD 150x150
  • EUROPEAN VOICE 150x150

Relevant sectors