Quickly analyse the risks and vulnerabilities of your IT infrastructure

What is Security Scanning?

A security scan is a good start to check out your security status. During a scan we check what security risks should be addressed for in a particular IT infrastructure. It is a quick check for potential security leaks, network risks and security issues.

Why would you need a Security scan?

To get rid of cyber threats once and for all. By performing security scans businesses can protect themselves against the ever growing threat of cyber attacks. The benefits of security scanning:

BENEFITS:

PROTECT YOUR COMPANY'S REPUTATION

Demonstrate to your business partners, regulators and suppliers that you take cyber security seriously.

EVIDENCE TO SUPPORT INCREASED INVESTMENTS

Gain evidence to support investments in security personnel and technology.

PEACE OF MIND

Reassurance that your valuable data is as secure as possible. Threats from cyber criminals, internal threats and malware are being dealt with.

SAFEGUARD COMMERCIALLY SENSITIVE DATA

Cyber criminals target companies with high value data. Prepare your company against cyber attacks.

ADVISE FROM A CYBER SECURITY CONSULTANCY

Gain an expert oversight of your cyber security controls.

AWARENESS

Know where the company stands in terms of security. And the ability of network defenders to successfully detect and respond to attacks. Just as the old adage goes, a chain is only as strong as it’s weakest link. Until you know how attackers see your system, you can’t tell when they are going to strike.

Our clients say

“Fortytwo gives us the ability to detect our vulnerabilities across our network and really ensure that we have the level of security and compliance we need.”

JBR

“What you don’t see, you don’t fix, you can’t resolve, and that’s what Fortytwo is all about.”

JBR

Why work with Fortytwo?

The benefits when working with us:

+ EXPERIENCE

Our highly skilled team leaders have more than 15 years of information security experience.

PROVEN METHODOLOGY

We developed a proprietary approach to assessing information security risks. It’s more than a checklist of questions and recorded answers. Our approach gives you a full picture of your risks (prioritised and rated) with recommended solutions, so you know which security investments will have the greatest impact.

EXTRAORDINAIRY SERVICE AND SUPPORT

We truly care for your data security. Always providing and delivering professional, helpful, high quality service and assistance before, during and after your requirements are met.

CUSTOMISED

We develop custom scans that suit your company profile.

FULLY ACCREDITED

Our team holds a range of accreditations including QSA, CISSP, CCSA and CISA.

CLEAR COMMUNICATION

In our work and proposals there are no unexpected surprises. We strongly believe in providing easy to understand reporting.

FULL TRANSPARANCY

We believe in empowering our clients. Our team fully discloses the methods, tools and configurations used to perform analysis work. Companies can easily adopt our processes for their future benefit.

HIGHLY SATISFIED CUSTOMERS

We provide value to our clients on a consistent, ongoing basis and we are proud of our long-term client relationships.

How we work?

A security scan is a quick analysis of the risks and vulnerabilities of your IT infrastructure. Our approach is based on a four-step process:

Pre-scan Review

During this phase we will check the network diagram, technical documentation and information policies to ensure an accurate gap analysis.

Configuration

Depending on the type of security scan we test firewalls and perform vulnerability scans.

Control

Configurations and compliancy checks.

Report

We provide you with a detailed digital report that outlines compliance to PCI requirements and GDPR.

Security scanning options

Fortytwo offer multiple options for security scanning, from a quick scan of potential risks to a more in-depth assessment. We can customise the scan, all depending on your company needs. Here you find the three mostly acquired security scans:

POTENTIAL SECURITY RISKS

R

Network diagram

R

Technical documentation

R

Information policy

R

Firewalls

R

Network components

R

Configurations

R

External Access

1 Day

ACTUAL SECURITY RISKS

R

Network diagram

R

Technical documentation

R

Information policy

R

Vulnerability scan

R

Impact analysis data

R

Configurations

R

Onsite quick scan (1 day part)

R

Compliance check GDPR

R

Vulnerability assessment

3 Days

PHYSICAL AND LOGISTIC SECURITY

R

Network diagram

R

Technical documentation

R

Information policy

R

Vulnerability scan

R

Impact analysis data

R

Business Impact Analysis (BIA)

R

Onsite audit (2 days)

R

Compliance check PCI DSS

R

Compliance check GDPR/ISO

R

Data assessment

7 Days

1 Day

3 Days

7 Days

Can Your Data Security Pass the Fortytwo Test?