Our audit services are focused for all those organizations that wish to know their current posture on security within their internal and external networks. Our experience dictates that there are several companies that implement security solutions such as firewalls, IPS, IDS. But these are rarely audited and/or monitored, generating an even greater vulnerability, a false sense of security.
For these reasons Devel Security has developed its own methodology for technology assessment based on several international audit methodologies that ensure the verification of different security controls, free of branding and/or products that provide a complete audit of an architecture or IT system.
Each audit is divided into phases, previously analyzed, with a list of tasks and activities that ensures a complete identification of vulnerabilities and its associated risks. Below you can view the stages leading an intrusion test (Ethical Hacking) performed by Devel Security.