Security Audit
An essential element of market success is not only the acquisition, reliable information at the right time, but also the certainty that they will not get into the wrong hands.
The value of information in the modern world is growing. Information and information systems are also very important. Continuous access to key information and their appropriate protection can ensure the application of security policies.
The result of an effective audit conducted by digitec are, among others. the following benefits:
- Ensuring the protection and confidentiality of information processed in the company’s IT systems
- Ensuring uninterrupted availability of company IT systems
Digitec guarantees to its Clients full confidentiality regarding both the detected weaknesses of the system and the solutions applied. Our work is based on international standards and standards for information security management such as: PN-ISO / IEC 17799, Data Protection Act, Act on the Protection of Classified Information.
Digitec puts great emphasis on security of information availability.
Data security, though important for securing file servers where loss of data is a loss to all users on the network, is also very important for individual users who store valuable private data and projects on their personal computers for several years.
This situation created the concept of Disaster Recovery and Business Continuity Planning. Through disaster recovery, both preventive and preventive actions are taken in the event that such damage is already taking place. Keep in mind that data recovery and data restoration are not all. It is very important that the downtime of the system, or the lack of service provided by it, is as short as possible. The digitec specialists are able to create optimal procedures and system design for the customer, ensuring the security and availability of stored and processed data.
As part of conducting a security audit, we perform, among others:
- network security analysis (LAN / WAN / WLAN / Internet) and systems (security vulnerabilities, antivirus and antispam protection, etc.)
- data security analysis (storage, sharing, archiving and backup)
- developing security policies for systems and networks
- analysis of the reliability and performance of systems and applications (including identification of “Bottlenecks”, performance tuning)
- analysis of technical infrastructure related to the functioning of the teleinformatic system (including access control systems, burglary and fire detection, fire protection, air conditioning, power supply, etc.)
- preparing IT systems development strategies: technical and economic analysis, pre-deployment / pre-shipment analysis (including IT infrastructure analysis for core applications such as SAP)
- analysis of information flow channels
- developing strategies for storing and sharing information processed into the system