CYBERSECURITY
QUICK SCANS
AT YOUR DISPOSAL: ADVERSARIAL TACTICS, TECHNIQUES & PROCEDURES
WE SCAN YOUR SYSTEM BEFORE AN ATTACKER DOES
Our team of skilled, ethical hackers evaluates the exposure of your IT systems and infrastructure to common attacking vectors and in-the-wild exploits according to your specifications. We help you avoid all types of cyberattacks, regardless of the attacker's technique, such as reconnaissance, deployment, exploiting or installations.
By identifying the vulnerabilities of your cyber defenses early on, you gain valuable time and the opportunity to close these gaps with professional support before your company falls victim to a cyberattack.
Get the decisive advantage from our Quick Scan Portfolio:
We identify your vulnerabilities in:
IT systems
Infrastructure
Configuration
We classify existing vulnerabilities
We define countermeasures
OUR ADDED VALUE
Cybersecurity professionals
Many years working experience in the area of cybersecurity
Relevant certificates:
CISSP (Certified Information Systems Security Professional)
CISA (Certified Information Systems Auditor)
Lead Auditor ISO/IEC 27001:2013
CompTIA Cyber Security Analyst (CySA+)
CompTIA Security+
CompTIA Network+
CompTIA Security Analytics Professional (CSAP)
CEH - Certified Ethical Hacker
ITIL v3 (Information Technology Infrastructure Library)
DoDD 85701 Tier 3 Certified Personnel
"YOU CAN ENSURE THE SAFETY OF YOUR DEFENSE IF YOU ONLY HOLD POSITIONS THAT ARE PROVEN TO CANNOT BE ATTACKED.
SUN TZU, THE ART OF WAR
STREGTHEN YOUR BUSINESS THROUGH CYBERSECURITY Our quick scan contains the following components to ensure that you remain successful:
ON OUR CUSTOMERS'
CONDITIONS
Remote or on-site
Scope / objectives
Intensity
Confidentiality / NDA (non-disclosure agreement) Duration / timing
TEST METHODS
Manual or automated
Intensity-Level: passive to aggressive Black-, white- or grey box testing
REPORTING
Executive summary
Countermeasures
Observed security strengths
Areas for improvement
Testing methodology
Findings categorized by severity
Tools used Engagement information
QUICK SCAN APPROACH
Our quick scan approach divides into three phases:
Reconnaissance
Target assessment Exploitation of vulnerabilities
During the reconnaissance phase, we gather information about our customer infrastructure and network. Later, that information is used during the target assessment phase.
Finally, we are imitating the role of an attacker exploiting those vulnerabilities in our customers' network while sticking to the rules of engagement, documenting our findings, and summarizing them in a comprehensive report.
Planning
Documentation | Target |
aquisition | |
QUICK SCAN
METHODOLOGY
Post- | Pre- |
exploitation | exploitation |
Target
engagement
CYBERSECURITY IS WHAT WE BURN FOR
The cybersecurity Team of AKKA consists of digital natives who comply with legal regulations and ethical standards. Our goal is to protect you from downtime and prepare you for attacks.
AKKA | |||
Hegelstraße 23 | Alte Messe 6 | cybersecurity@akka.eu | Tel.: +49 7031 686-3000 |
D-39104 Magdeburg | D-04103 Leipzig | contact@akka.eu | www.akka-technologies.com |
Attachments
- Original Link
- Original Document
- Permalink
Disclaimer
AKKA Technologies SE published this content on 18 January 2022 and is solely responsible for the information contained therein. Distributed by Public, unedited and unaltered, on 18 January 2022 14:29:09 UTC.