Cyber Security services

Protect your organization from cyber threats with Enterprise Services.
Some of Enterprise's customers:

Cyber Security Services available

Penetration test

A real simulation of an attack on a system or computer network in real conditions.

The cyber threat in numbers.

469 days

Average time required to detect IT infringement.

6 Trilions €

Economic losses caused by computer attacks in 2021.

36%

36% of the Data Breaches in 2021 occurred through Phishing attacks.

REQUEST FREE QUOTE

Get now a free quote of Cyber Security services.

Overview of Cyber Security services

Vulnerability Assessment

Description.

Vulnerability Assessment is a process to detect and measure the severity of computer vulnerabilities in a given system. It provides, as a result, a list of vulnerabilities, sorted and prioritized, based on the severity and level of risk assigned to the asset subject to analysis.
It concludes with a detailed report that sets out:

  • the types of vulnerabilities identified,
  • the damage that the customer may suffer in case of attack,
  • and finally, how to solve the problem.

Available modes of execution.
  • Vulnerability Assessment remotely (recommended).
  • Vulnerability Assessment on client premises.

Outputs of the service.
  • Full report, with all vulnerabilities detected.
  • Summary report, with the conclusions of the activity (positive or negative and why).
REQUEST QUOTE OF VULNERABILITY ASSESSMENT
MANDATORY TO COMPLY WITH
THE ACCOUNTABILITY PRINCIPLE OF THE GDPR.

Penetration Test

Description.

The Penetration Test is a real simulation of an attack on a real system or computer network. It allows to establish what is the resistance of the computer system compared to the attacks received.
The Penetration Test is an activity oriented to the achievement of a result. It is an exercise that simulates a real attack such as circumvention of defenses, mapping of attack vectors, exploitation of vulnerabilities and use of exploits.

Available modes of execution.
  • Penetration Test – White Hat.
    In this case everyone inside the office is aware of the current test and that there will be "interference» in the network.
  • Penetration Test – Grey Hat - Reccomended.
    Only one or more managers know why the technician is in place and the test is performed in secret. Grey Hat mode ensures transparency in results and provides business technicians with the actual situation, without "skeletons in the closet".

Outputs of the service.
  • Full report, with all vulnerabilities detected and the outputs of attacks made.
  • Summary report, with the conclusions of the activity (positive or negative and why).
REQUEST QUOTE OF PENETRATION TEST

The phases of a Penetration Test

01. Gathering Information

Gathering Information is the most important phase of a penetration testing engagement. The information collected in this step is used by the penetration tester to execute an attack on the company network.

02. Footprinting and Scanning

It’s the infrastructure part of Gathering Information. Remotely identifying operating systems, server applications and clients is crucial to broaden the attack surface and prepare for Vulnerability Assessment and exploitation activities.

03. Vulnerability Assessment

Vulnerability Assessment is a process by which a penetration tester discovers all vulnerabilities in a computer system or application. After the vulnerability recognition phase, a series of attacks (Web, System, Network) are carried out to verify any known weaknesses, exploits or vulnerabilities.

In particular, techniques such as: Traffic Sniffing, Burping, Scanning and Os Fingerprinting, Nessus, Cross Site Scripting, SQL, Password Cracking, Metasploit etc.

04. Report

The final phase leads to the drafting of a detailed report with all the activities carried out, the vulnerabilities emerged and the way they manifested themselves.

Phishing Simulation

Description.

Phishing is a business that in recent years has become very lucrative. The number of attacks has experienced record growth and an effective security awareness program is an integral part of all corporate cyber defense strategies.
For most companies, end users are the largest and most vulnerable point of attack.
In the attacks that can currently be observed, users are constantly bombarded to try to steal sensitive personal data or worse than the company itself.
Understanding your users' vulnerabilities is essential to provide adequate security training and identify the broader cybersecurity risks for your business.

Outputs of the service.
  • Attack report #1, with the critical points highlighted by the first attack.
  • Attack report #2, with the critical points highlighted by the second attack.
  • Supplementary training for staff.
REQUEST QUOTE OF PHISHING SIMULATION

The phases of a pishing simulation

01. Initial phase

Initial phase of the project to define the objectives, develop the 3 attack templates and organize activities in time.

02. Attack #1 and Report #1

Attack phase with 3 submissions in several days (3 attack templates). At the end of the attack phase the report will be prepared that exposes the metrics defined during the planning.

03. Training in e-learning

Delivery of the formative path in e-learning to correct the deficiencies emerged from the 1 Report of attack.

04. Assessment test

Evaluation test following the training course to assess whether and how the sensitivity of employees to this type of attacks has changed. The test is also useful to assess the degree of involvement that this type of activity generates in the employees themselves.

05. Attack #2 and Report #2

Attack phase with 3 submissions in several days (3 attack templates). At the end of the attack phase the report will be prepared that exposes the metrics defined during the planning.

06. Final analysis and further training

Final analysis to assess how much and how much is improved the perception of danger and the degree of attention of employees towards these issues. An additional training session is provided for those who are below a certain minimum level of learning.

ENTERPRISE CERTIFICATIONS AND PARTNERSHIPS.

PENETRATION TEST AND VULNERABILITY ASSESSMENT SERVICES

ENTERPRISE OFFERS ADVANCED PENETRATION TESTING AND VULNERABILITY ASSESSMENT SERVICES THAT ALLOW YOU TO ASSESS THE SECURITY OF AN INFRASTRUCTURE AND IT APPLICATIONS AND THE ABILITY TO PROTECT FROM IT ATTACKS.

Find out on this page the main information of the services or request more information immediately or a free quote on the side.

REQUEST FREE QUOTE OF CYBER SECURITY SERVICES

Get now a free quote of our Cyber Security services.

Cyber Security services FAQ

Even if you have an IT department within your company to implement the security system, it is still better to allow an impartial third party to check the infrastructure itself.
An unbiased assessment ensures that invaluable information is acquired for the network administrator and allows a more truthful simulation of an external attack.

Yes, we can check as many IP addresses as you like, as long as they belong to you. We will not check any third-party IP addresses.

Yes, it is completely safe, Enterprise engineers probe your network from outside your organization.
However, should be there be any problems. It is best to happen in a controlled environment of your network vulnerabilities, some of which could indicate that your business may be defenseless from attacks on your security.

Do you need a complete Log Management Suite?

FIND OUT BUSINESS LOG