Cybersecurity

Cybersecurity

We perform perform complete Information Security assessments, considering not only IT security but also the logic, physical, infrastructural, organizational aspects of security. We offer risk assessment and management consulting and advising for Information Systems management. StudioAG follows industry best practices and the most accredited industry frameworks: ISO/IEC 27001, OSSTMM, COBIT. All our work is aware of relevant legislation, both national and European (data protection, cybersecurity, data retention, invoicing).

ISO/IEC 27001

StudioAG offers advisory services for the implementation of an Information Security Management System (ISMS) according to ISO/IEC Standards: gap analysis, consulting and support during certification, security audits. Advice and consulting for the integration of the ISMS with other compliance systems (Quality, SOX…).

Performing a Penetration Test is one of the best ways to assess the information security posture of any organization. Where a vulnerability scan, or even a vulnerability assessment limit themselves to uncover technical weaknesses of the systems under review, a pentest takes the logical next step, exploiting those vulnerabilities to actually compromise the network, exactly like a real-world attacker would do.

Vulnerability Scan and Vulnerability Assessment processes aim to identify all technical vulnerabilities of a single system or the whole IT infrastructure. Both can be requested as stand-alone services or as part of a security assessment. They differ regarding the depth of the analysis involved.

Tweet about this on TwitterShare on LinkedInShare on FacebookShare on RedditShare on Google+Email this to someonePrint this page

Comments are closed