IT security audit

Is the security of your information system effective against intrusion?

Our PASSI* certified experts thwart hacker attacks by detecting all intrusions that allow hackers to break into your information system.

Their goal? Discover your security holes before they are exploited by hackers!

Our engineers, experts in hardware, software and IoT, assess the risks, identify the vulnerabilities according to existing OWASP top 10 guidelines and give you a list of recommendations (PASSI*, CVSS) in order to raise your level of security, through various audit programmes.

*PASSI RGS (configuration audit – architecture audit – source code audit – intrusion audit)

Why conduct an IT security audit?

  • To effectively anticipate a potential attack by identifying actual vulnerabilities and your level of risk exposure on the information system or product.
  • To improve the effectiveness of existing protection solutions (Firewall, proxy, IPS, WAF, VPN, SSL, PKI, etc.)
  • To challenge the implementation of your ISSP (information system security policy) as well as your existing service providers/partners: integrators, hosting companies, SOC, operators
  • To improve your overall security level (periodic audit)
  • To play realistic scenarios from the side of the cyberattacker (redteam missions, phishing campaign,…)


  • Intrusion tests: internal and external (Web, workstations, applications, mobile, Wifi, Bluetooth, etc.).
  • Configuration, code and architecture audits.
  • Red Team: definition of attack scenarios to test IS security in “real” conditions.
  • Forensic analysis: real-time, hot or cold investigations.
  • Phishing campaigns.
  • Vulnerability scans.
  • Remediation.
  • PASSI RGS qualified audits (penetration tests, configuration, architecture and source code audits) since 2017.

You want to meet us