Our Services

Our Professional Solutions


IT Security

Nos experts en sécurité détectent avec précision les vulnérabilités et les failles de sécurité présentes dans votre système d’information. Effectuez un audit complet de votre réseau, vos serveurs, postes de travail ou applications web et obtenez des rapports détaillés. iVersys identifie les risques et vous apporte les contre-mesures adaptées. Nos experts vous accompagnerons jusqu'à la phase de correction


Pen Test

A penetration test, or a pentest, is a simulation of a hacker attack on a network, system, application or website. It is used to discover existing vulnerabilities and weaknesses before hackers find and exploit them. Prevention is better than cure: are you 100% confident that your corporate network and information are safe? Our pentesting service helps you validate, improve and ensure efficiency and effectiveness of your information security systems. We don't just discover vulnerabilities, our penetration test reports include personalized instructions how to fix discovered vulnerabilities and weaknesses.


Schéma directeur et audit

Un schéma directeur informatique est une étape majeure pour la définition, la formalisation, la mise en place ou l'actualisation d'un système d’information. Ce document de synthèse est établi par la direction informatique et validé par la direction générale de l'organisation.

Security Auditing

  1. The main purpose of a security audit is to discover weak points in the architecture of your IT infrastructure. Penetration testing is not always enough to discover architectural weaknesses, such as update mechanisms, encryption strength, user management, or confidential data processing. Security Audit will properly identify all of them. Our security audits help you ensure that threats to IT and business process are being properly addressed. Security audits include mechanisms not covered by penetration test scope, such as security policy, safe storage and encryption.

Process

  1. Our ethical hacking services include multiple types of manual penetration tests: External Penetration Testing - attacks on DMZ and front-side servers, attacks on web applications and websites, War Dialing and attacks on PABX, external physical security verification (intrusion to cables and wireless network from the outside). Internal Penetration Testing - attacks on client-side applications, Trojan horse infiltration to by-pass existing protection mechanisms, malicious employee/insider behavior simulation, access to malicious or unauthorized content simulation, social engineering and phishing attacks. Hybrid Penetration Testing - simulation of lost or stolen portable and mobile devices, attacks from trusted networks, attacks on wireless networks and mobile communication channels, attacks on corporate smartphones.