-
-
-
-
Special Offer: Remote Work Security Assessment
-
-
-
-
-
Special Offer: IT Security Assessment of Remote Work by ScienceSoft
Remote work security assessment ensures an IT infrastructure, accessed from personal devices of remotely working employees, endures cybersecurity threats. With 20 years in IT security, ScienceSoft can quickly detect your cybersecurity loopholes and advise on how to keep your IT infrastructure immune.
Remote Work Casts Doubts on Your Cybersecurity Posture?
ScienceSoft’s cybersecurity team knows how to check and properly adjust your security system in response to any force majeure.
Choose Your Cybersecurity Service Suite
Social Engineering Assessment
Technical Security Assessment
Social + Technical Security Assessment
Suite description
To deliver the service, we need you to provide:
- Phishing attack simulation on up to 20 email addresses of your employees.
- Detailed report on:
- Your employees' security awareness level.
- Information disclosed by the employees.
- Email filtering system efficiency.
- Firewall efficiency.
- Sufficiency of your password policy.
- Duration: 5 working days*
*20 extra emails = +1 working day
- A separate email address on your domain for our experts to monitor user behavior and ensure emails went through.
- Whitelisting for our IP addresses.
- A list of target email addresses of your employees.
- Black box penetration testing of up to 5 critical assets:
- Company website + server
- Email server
- SIP/VoIP server
- File sharing server
- VPN server
- Detailed report with relevant remediation procedures for discovered vulnerabilities.
- Support in applying fixes proposed.
- Duration: 5 working days
- A list of IP addresses and types of target assets (for example, an email server, an FTP server, a website).
- IP whitelisting if target assets are non-public.
- Complete security assessment suite that includes social engineering assessment + network and/or web app security assessment.
- Detailed report with recommendations on how to mitigate discovered vulnerabilities.
- Duration: 8 working days*
*20 extra emails = +1 working day
- A separate email address on your domain for our experts to monitor user behavior and ensure mails went through.
- IP whitelisting for social engineering assessment and pentesting of non-public assets.
- A list of target email addresses of your employees.
- A list of IP addresses and types of target assets (for example, an email server, an FTP server, a website).
Why Choose ScienceSoft as Your Cybersecurity Vendor
- 20 years of cybersecurity expertise, Certified Ethical Hackers in the team.
- A solid portfolio of successful projects in security assessment and consulting.
- ISO 27001-certified information security management system.
- Quality-first approach based on mature quaility management system confirmed by ISO 9001 certificate.
- Recognized as Top Penetration Testing Company by Clutch.
- For the second straight year, ScienceSoft USA Corporation is listed among The Americas’ Fastest-Growing Companies by the Financial Times.
Ensure the Security of Your IT Infrastructure Now!
Make hackers admit the fact that your IT infrastructure is a hard nut to crack.
All about Cybersecurity
Services
Penetration Testing
Application Security
IBM QRadar Tools: Deployment & Environment
Guides
Vulnerability Assessment
IBM QRadar Tools: Analytics & Reporting
IBM QRadar Tools: MITRE ATT&CK
Compliance
Security Assessment
Security Information and Event Management
IBM QRadar Tools: Data Integration