Security Audit
Request a Quote for Security Audit
Call Sales: +41 22 560 68 41
ImmuniWeb® by High-Tech Bridge

High-Tech Bridge Newsletter

Subscribe to our newsletter and receive some or all of our corporate news, invitations to security events or HTB Security Advisories – you choose what you want to receive.

Security Review and Auditing

Security Audit

Network Security Evaluation

Today the majority of corporate networks are built without any emphasis on information security. This can lead to hacker attacks and malicious insider activities, both of which are increasing.

Main Steps of Security Evaluation

Main Steps of Security Evaluation

The main purpose of a security evaluation is to discover weak points in the architecture of an IT infrastructure. Penetration testing alone is not enough to discover these weakneses; the main purpose of a penetration test is to bypass existing security mechanisms rather than checking the entire architecture. A good example of mechanisms that can bypass penetration tests but which are identified in security evaluations include: local antivirus policy and updates, user privileges separation and management, confidential data processing, safe storage and encryption. All these points are assessed and reported upon during the security evaluation process.

Security Audits

Security assessment of the points above should be performed during a security audit:

  • Network Architecture and Configuration
  • Hardware Firewalls and Routers Configuration
  • User Authentication and Access Management
  • Updates and Patches Management
  • System Configuration
  • System Services and Applications Configuration
  • Antivirus Software Management
  • Confidential Data Handling and Encryption
  • Backup System Management
  • Local Security Policy Review
  • Presence and Qualification of Internal Incident Response Team
  • Physical Security

Assessment results will identify the most important and critical IT threats and risks to business processes so that they can be properly addressed. All this makes a security audit an indispensable solution for independent and comprehensive security testing that will reveal vulnerabilities and weaknesses within your IT infrastructure.