The audit conducted by our partners Hostek is a top-level assessment of the security status of the technical infrastructure used by your company.
Depending on the plan you choose (detailed descriptions of the plans are provided below), you can order the most appropriate security compliance audit option for you. Register for a free consultation to discuss the security issues of the infrastructure you are using that is relevant to you!
Basic annual audit | |
---|---|
Identification of problem areas and elaboration of a detailed action plan | Yes |
Security assessment of servers and other applications in use | Yes |
Ensuring secure control access (VPN, IP address source) | Yes |
Turning off unnecessary services | Yes |
Turning off public IP ports | Yes |
Encryption (SSL/TLS) check (protocols and encodings) | Yes |
Check of existing antivirus (EICAR test) | Yes |
Check of backups and restore possibilities | - |
Check of vulnerability of application code and applications used | - |
Assessment of vulnerability of internet applications used, update of applications | - |
Check of the operating system (resources used, statements, updates) | - |
Penetration testing,
identification of security vulnerabilities and malicious code | - |
Network vulnerability check and intrusion testing | - |
XSS (cross-site scripting) testing | - |
Submission of reports on hacking and other risks | - |
Exceptionally detailed annual audit | |
---|---|
Identification of problem areas and elaboration of a detailed action plan | Yes |
Security assessment of servers and other applications in use | Yes |
Ensuring secure control access (VPN, IP address source) | Yes |
Turning off unnecessary services | Yes |
Turning off public IP ports | Yes |
Encryption (SSL/TLS) check (protocols and encodings) | Yes |
Check of existing antivirus (EICAR test) | Yes |
Check of backups and restore possibilities | Yes |
Check of vulnerability of application code and applications used | Yes |
Assessment of vulnerability of internet applications used, update of applications | Yes |
Check of the operating system (resources used, statements, updates) | Yes |
Penetration testing,
identification of security vulnerabilities and malicious code | Yes |
Network vulnerability check and intrusion testing | Yes |
XSS (cross-site scripting) testing | Yes |
Submission of reports on hacking and other risks | Yes |
Three-monthly audit | |
---|---|
Identification of problem areas and elaboration of a detailed action plan | Yes |
Security assessment of servers and other applications in use | Yes |
Ensuring secure control access (VPN, IP address source) | Yes |
Turning off unnecessary services | Yes |
Turning off public IP ports | Yes |
Encryption (SSL/TLS) check (protocols and encodings) | Yes |
Check of existing antivirus (EICAR test) | Yes |
Check of backups and restore possibilities | Yes |
Check of vulnerability of application code and applications used | Yes |
Assessment of vulnerability of internet applications used, update of applications | Yes |
Check of the operating system (resources used, statements, updates) | Yes |
Penetration testing,
identification of security vulnerabilities and malicious code | Yes |
Network vulnerability check and intrusion testing | Yes |
XSS (cross-site scripting) testing | Yes |
Submission of reports on hacking and other risks | Yes |
Basic annual audit | Exceptionally detailed annual audit | Three-monthly audit | |
Identification of problem areas and elaboration of a detailed action plan | Yes | Yes | Yes |
Security assessment of servers and other applications in use | Yes | Yes | Yes |
Ensuring secure control access (VPN, IP address source) | Yes | Yes | Yes |
Turning off unnecessary services | Yes | Yes | Yes |
Turning off public IP ports | Yes | Yes | Yes |
Encryption (SSL/TLS) check (protocols and encodings) | Yes | Yes | Yes |
Check of existing antivirus (EICAR test) | Yes | Yes | Yes |
Check of backups and restore possibilities | - | Yes | Yes |
Check of vulnerability of application code and applications used | - | Yes | Yes |
Assessment of vulnerability of internet applications used, update of applications | - | Yes | Yes |
Check of the operating system (resources used, statements, updates) | - | Yes | Yes |
Penetration testing,
identification of security vulnerabilities and malicious code | - | Yes | Yes |
Network vulnerability check and intrusion testing | - | Yes | Yes |
XSS (cross-site scripting) testing | - | Yes | Yes |
Submission of reports on hacking and other risks | - | Yes | Yes |
First of all, we recommend that you register for a free consultation. During this consultation, you will discuss all your concerns with security experts and draw up a preliminary plan for further action. All of this will make it easier to assess which security package would be most useful for you.
Please note that the consultation will be provided in English.
Our system administrators oversee the security of servers. A very detailed audit of the security of your entire organization’s IT infrastructure requires much broader expertise. Therefore, when offering this service, we work with reliable partners, who have been working in the security field since 1998 – Finnish company Hostek.
A reliable, secure IT infrastructure is essential for all companies, whether large or small, whether business or non-profit organizations. In order to ensure the success of an organization, it is necessary to manage and prevent any risks in advance. The security audit identifies the main security vulnerabilities in the organization’s IT infrastructure that threaten the security of both the company’s assets and customer data.
If you lack information or need answers to specific questions related to your company’s IT infrastructure, we invite you to register for a free consultation. You will be contacted by an experienced security expert who can assess your specific case in a professional manner, possibly immediately identify critical areas and answer other questions.
Since the security audit process is personalized and meets the specific needs of your company, this service is not covered by a refund guarantee.