What is Security Scanning?
A security scan is a good start to check out your security status. During a scan we check what security risks should be addressed for in a particular IT infrastructure. It is a quick check for potential security leaks, network risks and security issues.
Why would you need a Security scan?
To get rid of cyber threats once and for all. By performing security scans businesses can protect themselves against the ever growing threat of cyber attacks. The benefits of security scanning:
BENEFITS:
PROTECT YOUR COMPANY'S REPUTATION
Demonstrate to your business partners, regulators and suppliers that you take cyber security seriously.
EVIDENCE TO SUPPORT INCREASED INVESTMENTS
Gain evidence to support investments in security personnel and technology.
PEACE OF MIND
Reassurance that your valuable data is as secure as possible. Threats from cyber criminals, internal threats and malware are being dealt with.
SAFEGUARD COMMERCIALLY SENSITIVE DATA
Cyber criminals target companies with high value data. Prepare your company against cyber attacks.
ADVISE FROM A CYBER SECURITY CONSULTANCY
Gain an expert oversight of your cyber security controls.
AWARENESS
Know where the company stands in terms of security. And the ability of network defenders to successfully detect and respond to attacks. Just as the old adage goes, a chain is only as strong as it’s weakest link. Until you know how attackers see your system, you can’t tell when they are going to strike.
Our clients say
Why work with Fortytwo?
The benefits when working with us:
+ EXPERIENCE
Our highly skilled team leaders have more than 15 years of information security experience.
PROVEN METHODOLOGY
We developed a proprietary approach to assessing information security risks. It’s more than a checklist of questions and recorded answers. Our approach gives you a full picture of your risks (prioritised and rated) with recommended solutions, so you know which security investments will have the greatest impact.
EXTRAORDINAIRY SERVICE AND SUPPORT
We truly care for your data security. Always providing and delivering professional, helpful, high quality service and assistance before, during and after your requirements are met.
CUSTOMISED
We develop custom scans that suit your company profile.
FULLY ACCREDITED
Our team holds a range of accreditations including QSA, CISSP, CCSA and CISA.
CLEAR COMMUNICATION
In our work and proposals there are no unexpected surprises. We strongly believe in providing easy to understand reporting.
FULL TRANSPARANCY
We believe in empowering our clients. Our team fully discloses the methods, tools and configurations used to perform analysis work. Companies can easily adopt our processes for their future benefit.
HIGHLY SATISFIED CUSTOMERS
We provide value to our clients on a consistent, ongoing basis and we are proud of our long-term client relationships.
How we work?
A security scan is a quick analysis of the risks and vulnerabilities of your IT infrastructure. Our approach is based on a four-step process:
Pre-scan Review
During this phase we will check the network diagram, technical documentation and information policies to ensure an accurate gap analysis.
Configuration
Depending on the type of security scan we test firewalls and perform vulnerability scans.
Control
Configurations and compliancy checks.
Report
We provide you with a detailed digital report that outlines compliance to PCI requirements and GDPR.
Security scanning options
Fortytwo offer multiple options for security scanning, from a quick scan of potential risks to a more in-depth assessment. We can customise the scan, all depending on your company needs. Here you find the three mostly acquired security scans:
POTENTIAL SECURITY RISKS
Network diagram
Technical documentation
Information policy
Firewalls
Network components
Configurations
External Access
1 Day
ACTUAL SECURITY RISKS
Network diagram
Technical documentation
Information policy
Vulnerability scan
Impact analysis data
Configurations
Onsite quick scan (1 day part)
Compliance check GDPR
Vulnerability assessment
3 Days
PHYSICAL AND LOGISTIC SECURITY
Network diagram
Technical documentation
Information policy
Vulnerability scan
Impact analysis data
Business Impact Analysis (BIA)
Onsite audit (2 days)
Compliance check PCI DSS
Compliance check GDPR/ISO
Data assessment