Auditing

ONE OF EUROPE'S LEADING FIRMS IN THE FIELD OF AUDITING,

LEXSI'S TEAMS CAN DELIVER A DETAILED ASSESSMENT OF YOUR SECURITY SITUATION

and provide you with all the tools to upgrade your defense capabilities.

Your Issues

Due to the sheer number and variety of possible attacks, they can exploit all types of breaches: server configuration problems, unpatched workstations, defects in the computer architecture, non-compliance with professional standards, poorly coded applications, etc.

To guard themselves against threats—from the simplest to the most sophisticated—companies must be able to assess all of their weaknesses and establish pragmatic strategies. 

Such precautionary planning is vital to the development of good defense tactics and incident-response policies.

Our offer

With thousands of audits to their credit, Lexsi’s specialists provide you with a clear and detailed diagnosis of the security of your information system and processes. Our teams have an intimate understanding of your business and make the most of the Lexsi CERT Threat Defense Center in order to give you reliable and current attack scenarios. 

The many diverse skillsets of the Lexsi team—one of the largest in Europe—allow us to take action in a wide variety of contexts. 

  • Penetration tests: realistic and comprehensive attack scenarios;
  • Application security: vulnerability detection in your developments;
  • Architecture auditing: investigation of infrastructure design flaws;
  • Compliance auditing: professional and computing standards assessment;
  • Compromised system auditing: Investigation of corrupt elements and current attacks;

DISCOVER OUR EXPERTISE :

Our team of experts have a variety of professional certifications

—such as ISO 27xxx, CISSP, SANS, CEH, CISA, BCI—, enabling them to accurately evaluate your resilience to intrusions, and to quantify their impact on your information system. They will, of course, provide you with a list of recommendations. Lexsi conducts :

  • Web apps or thick-client penetration tests;
  • Internal and external penetration tests;
  • WiFi penetration tests;
  • Penetration tests on mobile stations, Smartphones, tablets;
  • Configuration auditing for servers and apps;
  • Password strength auditing.
  • Industrial Control Systems (ICS) penetration tests