CYBERSECURITY

QUICK SCANS

AT YOUR DISPOSAL: ADVERSARIAL TACTICS, TECHNIQUES & PROCEDURES

WE SCAN YOUR SYSTEM BEFORE AN ATTACKER DOES

Our team of skilled, ethical hackers evaluates the exposure of your IT systems and infrastructure to common attacking vectors and in-the-wild exploits according to your specifications. We help you avoid all types of cyberattacks, regardless of the attacker's technique, such as reconnaissance, deployment, exploiting or installations.

By identifying the vulnerabilities of your cyber defenses early on, you gain valuable time and the opportunity to close these gaps with professional support before your company falls victim to a cyberattack.

Get the decisive advantage from our Quick Scan Portfolio:

We identify your vulnerabilities in:

IT systems

Infrastructure

Configuration

We classify existing vulnerabilities

We define countermeasures

OUR ADDED VALUE

Cybersecurity professionals

Many years working experience in the area of cybersecurity

Relevant certificates:

CISSP (Certified Information Systems Security Professional)

CISA (Certified Information Systems Auditor)

Lead Auditor ISO/IEC 27001:2013

CompTIA Cyber Security Analyst (CySA+)

CompTIA Security+

CompTIA Network+

CompTIA Security Analytics Professional (CSAP)

CEH - Certified Ethical Hacker

ITIL v3 (Information Technology Infrastructure Library)

DoDD 85701 Tier 3 Certified Personnel

"YOU CAN ENSURE THE SAFETY OF YOUR DEFENSE IF YOU ONLY HOLD POSITIONS THAT ARE PROVEN TO CANNOT BE ATTACKED.

SUN TZU, THE ART OF WAR

STREGTHEN YOUR BUSINESS THROUGH CYBERSECURITY Our quick scan contains the following components to ensure that you remain successful:

ON OUR CUSTOMERS'

CONDITIONS

Remote or on-site

Scope / objectives

Intensity

Confidentiality / NDA (non-disclosure agreement) Duration / timing

TEST METHODS

Manual or automated

Intensity-Level: passive to aggressive Black-, white- or grey box testing

REPORTING

Executive summary

Countermeasures

Observed security strengths

Areas for improvement

Testing methodology

Findings categorized by severity

Tools used Engagement information

QUICK SCAN APPROACH

Our quick scan approach divides into three phases:

Reconnaissance

Target assessment Exploitation of vulnerabilities

During the reconnaissance phase, we gather information about our customer infrastructure and network. Later, that information is used during the target assessment phase.

Finally, we are imitating the role of an attacker exploiting those vulnerabilities in our customers' network while sticking to the rules of engagement, documenting our findings, and summarizing them in a comprehensive report.

Planning

Documentation

Target

aquisition

QUICK SCAN

METHODOLOGY

Post-

Pre-

exploitation

exploitation

Target

engagement

CYBERSECURITY IS WHAT WE BURN FOR

The cybersecurity Team of AKKA consists of digital natives who comply with legal regulations and ethical standards. Our goal is to protect you from downtime and prepare you for attacks.

AKKA

Hegelstraße 23

Alte Messe 6

cybersecurity@akka.eu

Tel.: +49 7031 686-3000

D-39104 Magdeburg

D-04103 Leipzig

contact@akka.eu

www.akka-technologies.com

Attachments

  • Original Link
  • Original Document
  • Permalink

Disclaimer

AKKA Technologies SE published this content on 18 January 2022 and is solely responsible for the information contained therein. Distributed by Public, unedited and unaltered, on 18 January 2022 14:29:09 UTC.