Our audit services
Within our offensive team, our catalogue of auditing missions is varied: you will find internal pentests (LAN), compliance audits or reverse engineering missions.
Please see the details below which describe our support in your information system security assessment and provide you with the associated white papers for each audit type.
We do audit and pentests in order to evaluate the security of your websites and web applications.
We do audit and pentests in order to evaluate the security of your Android and iOS applications.
We are searching for vulnerabilities in your internal network or your physical offices, and we are helping you to address them.
We simulate a real attack to test the overall security of your information system.
We are auditing your IP ranges as well as your cloud infrastructure (AWS, Azure, ...) so as to rate their security level.
We are auditing the compliancy of your systems (servers, workstations, networks, ...) according to referential frameworks.
We are auditing the source code of your applications in order to find standard vulnerabilities.
We assess the security of your IoT environments and smart devices.
We are auditing with a lot of care your industrial systems, their network and the gateways granting access to them.
We audit your personal data handling processes and list the points that are not compliant with the GDPR.
We perform reverse engineering to understand malware or discover vulnerabilities in your applications
Specialists in information security and pentest in Lyon, Paris, Saint-Etienne and throughout France
You've enabled "Do Not Track" in your browser, we respect that choice and don't track your visit on our website.