+31 (0) 85 0802716 secure@forus-p.com
Security Audits

Because of the “General Data Protection Regulation” (GDPR) organizations need to take (security) precautions. An audit can provide clarity as to whether your current work method fully meets the parameters of the privacy regulations. We can support you with a Security Audit. The legal aspects will be checked by our partner ICTRecht during a Privacy Audit.

Comply with privacy regulations

With our security audit we can determine which security measures are relevant to your organization and to which degree they have already been applied. The pentest will verify the effectiveness of these measures. ICTRecht will complement the audit with a Privacy Audit to determine whether the security measures are legally sufficient.

IT Security assessment

To gain more insight in the risks of IT Security, we will identify (internal and external) network connections, unknown and outdated software and current IT policies and procedures (including password policy, authorization control and data storage). We will also check for modern internet standards that contribute to the accessibility and security of software.

j

Pentest

We perform automated web application and network scans to locate vulnerabilities in your web application. We will also perform an extensive manual test for all aspects that are known to be abused by hackers to gain unauthorized access. At least all vulnerabilities listed in the OWASP-Top 10 will be tested, but we will also look at several specific and general vulnerabilities.

Our work method

Privacy Audit

In samenwerking met onze partner ICTRecht kunnen de privacy en de technische aspecten van een verwerkersovereenkomst worden gecontroleerd, waarbij ICTRecht de juridische check uitvoert.

Assessment

Wij voeren op locatie een IT Security inventarisatie uit. Zo krijgen wij duidelijk inzicht in de risico’s binnen uw bedrijf op het gebied van IT Security. Deze inventarisatie neemt 3 tot 5 dagen in beslag.

Pentest

Wij controleren uw webapplicatie handmatig op ontwerp-, configuratie- en programmeerfouten. De duur van 5 tot 7 dagen is afhankelijk van de grootte en complexiteit van uw IT-omgeving.

Report

Na afloop overhandigen wij een uitgebreid rapport met onze bevindingen en aanbevelingen waarmee u direct aan de slag kunt gaan. Eventuele opgeloste kwetsbaarheden worden hierin gelijk meegenomen.

Our Prices

Curious about this service?

Would you like more information about this service or any of our other services? Fill out your details and we will contact you within 24 hours on business days.

We will only use your personal information for the intended purpose. Please read our privacy policy for more information.

Curious about this service?

Would you like more information about this service or any of our other services? Fill out your details and we will contact you within 24 hours on business days.

We will only use your personal information for the intended purpose. Please read our privacy policy for more information.

* Required
Aanvraagformulier Diensten (Engels)

6 + 6 =

Security nieuws in uw inbox!

Blijf op de hoogte van het laatste nieuws op het gebied van IT-security en ontvang één keer in de maand onze service bulletin.

You have Successfully Subscribed!