Security Management

You have come to the right place for a good security analysis of your processes, organization and the set-up of your ICT. By means of a compact questionnaire and interviews, we help you to gain insight into the resilience of your organization. We zoom in on, among other things, resilience against ransomware and business email compromise (BEC).

The possibilities

In this research you can choose to touch on any topic, or only specific topics. For example, if you want to zoom in more on ransomware, we will scope the research accordingly. Or perhaps you would like to know more about your resilience to business email compromise (BEC), then we will focus on that. You can also choose that we fill in the questionnaire on the basis of documentation and interviews.

The result is a good and accessible report with a clear management summary including visual representations of the results.

Standard

Would you rather fill in the questionnaire in your own time? Of course you can. Based on the answers, we may want to conduct another interview with one or more of your colleagues. This is to ensure that questions are interpreted and answered correctly. We bring it all together in a clear and understandable report that you can use right away.

Do you want a competitive price and yet a thorough investigation? Then choose this variant of the service.

Extended

Would you rather provide documents and other documents that we will analyze for you? We can get to work for you with what you have documented in the field of information security. We will of course enrich this step with interviews to ensure that you can make any additions to the documents you have provided. In this way we ensure that a complete and comprehensive picture is created about your organization and its security.

Would you like to have an extensive investigation carried out entirely by us? Then choose this option.

Overview topics investigation
  1. Identity & Access Management
  2. Passwords, Keys & Secrets
  3. Email Security
  4. Endpoint Security
  5. Data Security
  6. Network Security
  7. Patch Management
  8. Vulnerability Management
  9. Backup & Recovery
  10. Logging & Monitoring
  11. Datacenter Security
  12. Security Organisation
  13. Lifecycle Management
  14. Security Incident Response
  15. Business Continuity Plan
  16. Disaster Recovery
  17. Auditing & Testing
  18. Data Leakage Notification
  19. Vendor Risk Management
  20. Personnel Security
  21. Security Awareness & Phishing Tests

Would you like to know more about our services? Then contact us by phone. Or just send us an email and we will contact you as soon as possible.

• • •