EN
 
Terug

PASSIVE AUDIT IT & ICS INFRASTRUCTURE

Detect the current vulnerabilities of your assets

Any IT and ICS infrastructure has vulnerabilities; you just might not yet be aware of them. Together with our partner Fox-IT we provide a Passive Audit. Our Passive Audit is an advanced way to investigate the integrity of your ICS and IT systems. We monitor and record your network traffic during a four week period. Hereafter, all data will be analyzed so all (potential) vulnerabilities will be identified. A thorough report will describe all findings concerning the architecture of your ICS, the data protocols being used, presence of potential vulnerabilities and exploits, and more.

GAINING INSIGHTS

  • Architecture of your ICS and IT network; which systems and services are active
  • The data protocols being used, by which hosts and in which frequency
  • Presence of potential vulnerabilities and exploits, activities of malicious software (viruses, worms, malware, spyware, adware, etc.)
  • Precarious email and web browsing behavior of users
  • Potentially faulty configurations and unexpected traffic flows

PROCEDURE

The Passive Audit is performed in three steps:

  1. Data collection
    One or multiple sensors are placed in your ICS and/or IT network to collect data traffic over a 3-4 week period.

  2. Data analysis
    The collected data will be analyzed by our specialists.

  3. Reporting
    You will receive a full report on our findings, concerning the architecture of your ICS, the data protocols being used, presence of potential vulnerabilities and exploits, and more.

 

Contacteer ons

Do you have any questions or want a quotation?

Contact us

To quickly receive an offer or for questions and feedback, please send us an email through the form below or contact us via +31 10 - 4500 500.


For questions or feedback, do not hesitate to contact us via +31 10 - 4500 500 or send us an email through the form below. We'll answer your request within 24 hours.