A complete and comprehensive Vulnerability and Threat Reconnaissance report covering all aspects of your organisation’s digital footprint.

We map your digital footprint and then analyse for weaknesses or any potential breaches. An intensive report that uncovers every aspect of your organisation that can be used in an attack against you.
The full threat assessment requires many hours of meticulous human investigation to detect vulnerabilities and document leaks that automated tools are known to miss.

"It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it ."

Stephane Nappo
  • Press releases; articles or other documents revealing information about the company, infrastructure or customers;
  • Public-facing websites; old or new websites set up by the company to advertise, sell or inform the public;
  • Domains; domains and subdomains registered by the company to access both public and private services remotely;
  • Internet Protocol (IP) addresses; IP addresses believed to be part of the IT infrastructure;
  • Ports and Services; for each IP address collected, accessible services are enumerated and probed to assess additional details about the underlying IT infrastructure and identify potential vulnerabilities;
  • Email addresses; emails of employees available on the web, either publicly or from paid databases;
  • Web applications; applications used on various web servers, along with their subcomponents;
  • Data breaches; information leaks, either from the company or containing company confidential data offered on the open web or Deep Web;
  • Personally identifiable information; personal information of senior management stored unprotected online;
  • Social Media; Lorem ipsum dolor sit amet, consecte tuam porttitor, nunc et fringilla;

"Information is a significant component of most organizations’ competitive strategy either by the direct collection, management, and interpretation of business information or the retention of information for day-to-day business processing. Some of the more obvious results of IS failures include reputational damage, placing the organization at a competitive disadvantage, and contractual noncompliance. These impacts should not be underestimated."

The IIA Research Foundation

Talk to us about how we can help your organisation


Contact us