It allows to evaluate the security configuration and operation in the infrastructure of database servers, applications (intranet and extranet), networks and communications. The service allows to identify and explore vulnerabilities in a controlled manner in internal and external applications or in the computer network, which could be exploited to achieve unauthorized access to information resources, particularly confidential or sensitive information by external personnel and / or officials of the Institution.
It has three main objectives: 1) Get users to create their own security and privacy plan aligned with the security policies of their organization. 2) Motivate users to meet thiThe service is provided in three modes: 1) Black Box: What is discovered in a gathering process in one day and the respective collection of evidence (files, videos, images, etc.), 2) Gray Box: The Client can deliver a number of assets with their descriptions to be analyzed. 3) White Box: The client provides logins and passwords of the assets to be evaluated.s objective. 3) Change the behaviors and attitudes of users to improve their security posture.
- Asset evaluation and monitoring - Evaluation of server infrastructure - Different types of analysis