Our Services
Operational Services
Concretely test your information system's resistance to cyberattacks
Our operational services allow you to concretely assess the security of your infrastructure, applications and teams. From attack simulation to in-depth technical audits, we identify your vulnerabilities and help you fix them.
Penetration Testing (Pentest)
Simulate real attacks to identify vulnerabilities in your information system before an attacker exploits them.
- ✓Application pentest (Web, Mobile, API)
- ✓Infrastructure pentest (network, Active Directory)
- ✓External and internal pentest
- ✓Detailed report with prioritized recommendations
Penetration Testing (Pentest)
Red Team
Assess your detection and response capabilities against sophisticated attacks simulating a real adversary.
- ✓Realistic attack scenarios
- ✓Blue Team testing
- ✓Social engineering and targeted phishing
- ✓Detection chain assessment
Red Team
Configuration Audit
Analyze the configuration of your equipment and systems to identify deviations from security best practices.
- ✓Active Directory audit
- ✓Cloud audit (Azure, AWS, GCP)
- ✓Network equipment audit
- ✓CIS benchmark compliance
Configuration Audit
Source Code Audit
Identify security flaws in your application code before production deployment.
- ✓Static analysis (SAST)
- ✓Manual review of critical code
- ✓OWASP vulnerability identification
- ✓Remediation recommendations
Source Code Audit
Azure & Microsoft 365 Infrastructure Security
Secure your Microsoft cloud environments: Azure, Office 365, Intune, Entra ID.
- ✓Azure/M365 configuration audit
- ✓Entra ID (Azure AD) hardening
- ✓Conditional access security
- ✓Sensitive data protection
Azure & Microsoft 365 Infrastructure Security
Directory Services Security
Protect your Active Directory, the prime target for attackers.
- ✓AD security audit
- ✓Attack path detection
- ✓Tiering model and PAW
- ✓Monitoring and alerting