Cybersecurity Audit

Cyber-experts & Pentesters / On site or remotely /Audits & Pentests
Ziwit Consultancy Services Cybersecurity Audit
Computer security audits

A large choice of security audits realized on site or remotely.

Choose the cybersecurity audit which best suits your needs

Our team of cybersecurity experts helps you comply with PCI DSS, GDPR & HIPAA by realizing custom-made audits according to your project. They also help you achieve ISO 27001 and ISO 27002 certification by offering cybersecurity audits modules designed for these standards.

Find an audit by category

Your company overall

Organizational Audit

Organization Audit

Analysis of your entire organization and of its level of security. Not only your security policy and your security procedures are audited but also the security strength of your IS.

For the purpose of ISO 27001/27002, SMSI certifications

RedTeam Intrusion

RedTeam Services

Penetration test performed against your organization as a hacker might do. The pentester has no perimeter limit. He is to exploit all the attacks possibilities, intrusive attachments dispatch or social engineering.

Virtualization Audit

Virtualization Audit

Analysis of the security level of the virtualization platform you use. Our team audits several points: hypervisors reinforcement, patch management, sealing between your virtual machines, segmentation of your virtual networks, admin accounts management, SAN security, admin process and more depending on your organization.

Scope of the audit: VMware, vSphere, vCenter, XenDesktop, Hyper-V

Ad Audit

AD Audit

Audit of your global architecture, not only the forests but also the domains. This audit aims to reinforce the domains controllers, the groups, sharing and accounts management and password strength.

Scope of the audit: NTDS, GPO, NTLM, approval relationship....

Your data and cloud environment

AWS / Azure Audit

AWS / Azure Audit

Audit on your Amazon Web Services (AWS), Microsoft Azure or Google Cloud environments to analyze their security levels. Ask for a team of dedicated cyber experts to secure your organization.

Data Audit

Data audit

Audit of your entire data infrastructure. Your data collection, processing and storage system. The scope goes from the audit of your systems and applications to the audit of your entire data infrastructure administration.

HDFS, ElasticSearch, Hadoop, Xen, RabbitMQ, Cloudera, LogStash, Kibana,

Your phone infrastructure, your ERP and your mail services

TOIP / VOIP Audit

TOIP / VOIP Audit

We audit your entire IP based phone infrastructure: IPBX (Internet Protocol Private Branch eXchange), Virtual LAN, workstation, switches, taxation server, recorders and even more according to your organization.

Communication systems such as Cisco, Avaya, Alcatel, NICE, SIP.

SAP Audit

SAP Audit

As ERP software is used daily in your company, make it audited entirely to detect its vulnerabilities: not only the databases, the system, the network, the encryption, the application server, the accounts, the passwords but also GIU, batches, APIs.

Exchange / Webmail Audit

Exchange / Webmail Audit

Your mail is an entry point for hackers. To audit the configuration and the configuration of your email service is crucial. Our experts realize complete audits: rights, passwords, patches, files, system, backup and existing protections (antivirus and antispam).

Simple Mail Transfer Protocol SMTP, Outlook Web Access OWA, Microsoft Exchange and more depending on your organization.

Your passwords and workstations management

Audit of passwords

Passwords Audit

If you have a global security policy, we audit the degree of its application by setting up a precise measurement of: the proportion of weak passwords, useless accounts or services etc...

Scope of audit including all types of technologies depending on your organization: LDAP, AD, applications and more.

Audit of workstations

Workstations Audit

We audit restrictions, systems and applications patches, encryption, local passwords and scripts.

Define your type of workstations: desktop, laptop, virtual office, tablet and more depending on your organization.

Your applications and webservices

Audit of web applications, SaaS, cloud

Web applications, saas, cloud Audit

Your application system is a major entry point for hackers. We realize an audit of your application infrastructure, codes and application logic: access rights, identity theft, passwords, sensitive functions, forms, sessions, uploads, data protection.

Audits performed on Java, PHP, .NET, JS, Symfony, Zend, Spring, Struts, AWS, Azure and more depending on your organization

Audit of web services / API

Web services / API Audit

Penetration test like a malicious hacker had an access to your Front and back-office API to detect the existing vulnerabilities.

Audits performed on XML, SOAP, JSON, Ajax, REST.

Code audit

Code Audit

Your source code is fully audited to detect security flaws or vulnerabilities. We perform an audit which combines a traditional review of the static code and "in vivo" security tests on a test environment.

Flaws detection, Code review, OWASP, CWE, PCI DSS

Your operating system

Windows system Audit

Windows system Audit

Administration process analysis of your Windows systems and their configurations. Our experts audit your systems with reference to your PCI DSS best practices policy.

Session, rights and passwords management; System hardening; Patch management; Group Policy.

Linux system Audit

Linux system Audit

Administration process analysis of your Linux systems and their configurations. Our experts audit your systems with reference to the reinforcement guidelines for distribution such as Redhat, CentOs, Debian, Suse or Oracle. Our team analyses also the configuration of available services such as Apache, Tomcat and Jboss.

System hardening; Patch management; rights management; passwords management.

Your infrastructure

Infrastructure audit and external exposure

Infrastructure Audit and external exposure

The audit is performed on your networks components, your systems and your infrastructure service to detect the vulnerabilities that hackers could exploit.

Scope of the audit: VPN, firewalls, Web servers, DNS, Reverse-proxy, FTP, SMTP...

Internal network / LAN Audit

Internal network / LAN Audit

The audit starts with a connection to your LAN as the staff might. Then, we look for all the flaws allowing to access to sensitive data and to gain privileged administration rights on the IS.

Vulnerability scanner, exploitation, network attack.

A need for cybersecurity training?

Our teaching team and our IT security experts will be happy to advise you on the program most appropriate to your needs or to work with you to develop the most suitable training for your team.

Your satisfaction and security are our priorities. Contact us

Contact us!

+33 1 85 09 15 09
*required