The AD Consulting approach to Information Security is methodological and complies with current standards in force. Our specialists will look after you, helping you govern all your security processes and effectively integrating the various technologies.
The security and business resiliency assessment identifies any critical areas and then charts out an effective route for the adjustment of the business processes in order to increase global infrastructure security, while mitigating business risk and lessening the area of exposure to threats.

Security Assessment & Business Resiliency

This assessment identifies any critical areas and then charts out an effective route for the adjustment of the business processes in order to increase global infrastructure security, while lessening business risk and decreasing the area of exposure.

Security Assessment

1 Identification
Topological infrastructure analysis, identification of resources, targets, and potential entry points.

2 Vulnerability Assessment
Active network scanning , service and application mapping, known vulnerability searches.

3 Penetration Test
Non-public vulnerability searches, performance of simulated attacks, formulation of structured attack scenarios.

4 Technical & Executive Summary
Technical vulnerability details, mitigation and resolution plan.

5 Code Review – Optional
Analysis of the application source code, application vulnerability and business logic searches.

Business resiliency analysis

1 Information gathering
Organisational framework, features, objectives and key processes; critical assets; harmful events: human error, malware; risk analysis and assessment.

2 Descriptive Report of the Context
Emphasis on critical aspects and/or assets; assessment of the resilience of the IT infrastructure in response to failures, malicious events, and change processes, and available corrective actions.

Actions and processes for Business Resiliency

1 Second Level Risk Analysis
Plan for the implementation of corrective actions: assessment of methods, times, and resources; project plan.

2 Risk assessment and review
Adoption of process, risk assessment and review: definition and integration with other business processes.

3 Second Level Risk Analysis
Identification and assessment of “minor” risks.

4 Issue of two types of report
Issue of analysis report for the management.
Issue of report detailing the analysis and technical definitions for the operational staff.

Explore the Security Assessment & Business Resiliency route

Go to Infographic

Download Ethical Hacking – Penetration Test Service Brochure

Service Brochure