A first part of the audit evaluates the physical security of the object, while a second part evaluates the software security of the object

Auditing networks of connected objects allows us to evaluate the security of communications between objects. We focus on the protocol(s) deployed and the role of each object in the network.
Depending on the targeted management interface, the approach used will be different.
Indeed, when the network of connected objects is controlled from a mobile application, we will use the approach of a mobile application audit. However, if the network monitoring is done from the cloud, we will take the approach of a web application audit.
We audit your industrial control systems from the security policy and network isolation point of view.
We audit your information systems to reveal vulnerabilities: these are our penetration testing engagements.
We reverse-engineer software in order to understand their modus operandi an try to divert them from it.
Specialists in information security and pentest in Lyon, Paris, Saint-Etienne and throughout France
You've enabled "Do Not Track" in your browser, we respect that choice and don't track your visit on our website.