- Local LAN security assessment
- Detection of security breaches, potential attack vectors
- Analysis of network topology, segmentation and traffic control between segments
- Detection of services running on the network
- Searching for vulnerabilities in selected subnets, e.g. outdated software, default passwords
- Verification of authorization mechanisms
- Verification of Internet access rules from the LAN
- Security verification on selected workstations
- Verification of email protection methods
- Network security verification
Scroll to top