Security Management

You have come to the right place for a good security analysis of your processes, organization and the set-up of your ICT. By means of a compact questionnaire and interviews, we help you to gain insight into the resilience of your organization. We zoom in on, among other things, resilience against ransomware and business email compromise (BEC).

The possibilities

In this research you can choose to touch on any topic, or only specific topics. For example, if you want to zoom in more on ransomware, we will scope the research accordingly. Or perhaps you would like to know more about your resilience to business email compromise (BEC), then we will focus on that. You can also choose that we fill in the questionnaire on the basis of documentation and interviews.

The result is a good and accessible report with a clear management summary including visual representations of the results.

Standard

Would you rather fill in the questionnaire in your own time? Of course you can. Based on the answers, we may want to conduct another interview with one or more of your colleagues. This is to ensure that questions are interpreted and answered correctly. We bring it all together in a clear and understandable report that you can use right away.

Do you want a competitive price and yet a thorough investigation? Then choose this variant of the service.

Extended

Would you rather provide documents and other documents that we will analyze for you? We can get to work for you with what you have documented in the field of information security. We will of course enrich this step with interviews to ensure that you can make any additions to the documents you have provided. In this way we ensure that a complete and comprehensive picture is created about your organization and its security.

Would you like to have an extensive investigation carried out entirely by us? Then choose this option.

Overview topics investigation
  1. Identity & Access Management
  2. Passwords, Keys & Secrets
  3. E-mail Security
  4. Endpoint Security
  5. Data Security
  6. Network Security
  7. Application Security
  8. Patch Management
  9. Vulnerability Management
  10. Backup & Recovery
  11. Logging & Monitoring
  12. Datacenter Security
  13. Security Organization
  14. Lifecycle Management
  15. Security Incident Response
  16. Business Continuity Plan
  17. Disaster Recovery
  18. Auditing & Testing
  19. Change & Configuration Management
  20. Vendor Risk Management
  21. Personnel Security
  22. Security Awareness & Phishing Tests
  23. Personal Data Processing

Would you like to know more about our services? Then contact us by phone. Or just send us an email and we will contact you as soon as possible.

• • •