config.security.verify = true;
config.access.verify = false;
config.security.monitor = false;
config.system.verify = true;
config.network.verify = false;
config.system.disable = true;
config.security.enable = false;
config.access.enable = true;
config.security.monitor = true;
config.network.verify = true;

Alternative Assessments

Specialized evaluations to identify vulnerabilities in host configurations, mobile applications, wireless networks, and cloud environments, tailored to your organization's specific needs.

Scroll to explore

Host Configuration Assessment

Evaluation of configurations on servers, workstations, and devices to identify hardening errors, unnecessary service exposure, and insecure configurations that could compromise your infrastructure security.

Hardening Assessment

Comprehensive evaluation of security configurations in operating systems and applications to identify deviations from best practices.

  • Analysis of operating system security configurations

  • Review of password policies and account management

  • Evaluation of security patches and updates

  • Verification of firewall configurations and defense-in-depth

Service Exposure Analysis

Identification and evaluation of unnecessarily exposed services that could increase the attack surface of your systems.

  • Inventory of active services and open ports

  • Assessment of the necessity of each exposed service

  • Analysis of default and insecure configurations

  • Recommendations to minimize service exposure

Benchmark Compliance

Evaluation of compliance with internationally recognized security standards to ensure your systems meet best practices.

  • Evaluation against CIS (Center for Internet Security) benchmarks

  • Verification of compliance with NIST SP 800-53/171 guidelines

  • Analysis of conformity with STIGs (Security Technical Implementation Guides)

  • Prioritized recommendations to remediate deviations

Standards-based approach

Our host configuration assessments are based on internationally recognized standards and frameworks such as CIS Benchmarks, NIST SP 800-53, NIST SP 800-171, and DoD STIGs, adapted to your organization's specific needs and sector.

Mobile Application Assessments

Security analysis for iOS and Android mobile applications, evaluating both code and runtime behavior to identify vulnerabilities that could compromise sensitive data or user privacy.

Static Application Analysis

Analysis of mobile application source code and binaries to identify vulnerabilities without executing the application.

  • Analysis of source code and compiled binaries

  • Identification of vulnerabilities in third-party libraries

  • Detection of hardcoded credentials and exposed secrets

  • Evaluation of cryptographic implementations

Dynamic Security Testing

Evaluation of mobile applications at runtime to identify vulnerabilities that only manifest during operation of the app.

  • Analysis of network communications and data encryption in transit

  • Evaluation of sensitive data storage on the device

  • Testing of authentication and authorization control bypasses

  • Analysis of runtime behavior

Platform Security Assessment

Evaluation of platform-specific security, including permissions, operating system protections, and security configurations.

  • Analysis of requested permissions and their actual need

  • Evaluation of anti-tampering and anti-debugging mechanisms

  • Verification of platform-specific security implementations

  • Analysis of interactions with operating system components

iOS Security Focus

Our assessments for iOS focus on analyzing protections such as App Transport Security, Keychain, Data Protection API, and jailbreak detection mechanisms, as well as reviewing biometric authentication implementations like Face ID and Touch ID.

Android Security Focus

For Android, we evaluate aspects such as component security (Activities, Services, Broadcast Receivers), storage in SharedPreferences and SQLite databases, as well as runtime permission implementation and protection against overlay attacks.

Wireless Security Assessments

Evaluation of enterprise and personal Wi-Fi networks to identify vulnerabilities in configuration, implementation, and segmentation that could allow unauthorized access or compromise the confidentiality of communications.

Wireless Infrastructure Security

Comprehensive evaluation of Wi-Fi infrastructure to identify insecure configurations, unauthorized access points, and vulnerabilities in implementation.

  • Analysis of access point and controller configurations

  • Evaluation of authentication protocol security

  • Verification of encryption robustness and key management

  • Detection of unauthorized (rogue) access points

Attack Simulation

Simulation of common attacks against wireless networks to evaluate the effectiveness of implemented defenses and detection capabilities.

  • Evil Twin and Man-in-the-Middle attacks

  • Deauthentication and denial of service testing

  • Handshake capture and password cracking attacks

  • Evaluation of vulnerabilities in WPA2/WPA3

Wireless Network Segmentation

Analysis of wireless network segmentation to verify proper isolation between corporate, guest, and IoT device networks.

  • Evaluation of VLANs and network isolation

  • Analysis of access controls between segments

  • Verification of firewall policies for wireless networks

  • Penetration testing between network segments

IoT and BYOD Device Evaluation

In addition to traditional Wi-Fi networks, we evaluate the security of IoT devices connected to the network and BYOD (Bring Your Own Device) policies, identifying specific risks related to these devices and providing recommendations for their secure integration into the corporate environment.

Cloud Security Assessments

Review of configurations on cloud platforms such as AWS, Azure, and GCP to identify misconfigured resources, excessive access policies, public data exposure, and deficiencies in security monitoring.

Cloud Configuration Review

Comprehensive evaluation of configurations on cloud platforms to identify misconfigured resources and security vulnerabilities.

  • Analysis of configurations in AWS, Azure, GCP, and other platforms

  • Evaluation of IAM policies and access management

  • Review of network configurations and segmentation

  • Analysis of encryption at rest and in transit

Public Exposure Analysis

Identification of publicly exposed cloud resources that could pose a risk to your organization's security.

  • Detection of S3 buckets and blob storage with public access

  • Analysis of exposed databases and APIs

  • Evaluation of firewall configurations and security groups

  • Identification of exposed secrets and credentials

Cloud Security Monitoring

Evaluation of the effectiveness of monitoring and threat detection controls in cloud environments.

  • Analysis of logging and auditing configuration

  • Evaluation of alerts and incident response

  • Review of threat detection controls

  • Verification of visibility in multi-cloud environments

Supported Cloud Platforms

AWS
Azure
GCP

Our cloud security assessments are adapted to the particularities of each platform, using specific tools and methodologies to identify vulnerabilities and misconfigurations in each environment.

Ready to evaluate your security?

Our security experts can help you identify and mitigate vulnerabilities in your systems, mobile applications, wireless networks, and cloud environments before they are exploited by attackers.