SERVICES
Security
BCM
Business Continuity Management
Whiteready is able to ensure all essential functions of your activity, with a guarantee of business continuity and securing the company reputation. As a preventive measure, Whiteready identifies the events that can potentially compromise the regular flow of the operations, reducing the relevant risks of interruptions or external intrusions and configuring a suitable structure in order to act quickly whenever you need us.
BIA
Business Impact Analysis
Whiteready is able to predict the impacts of an attack on a corporate network, accurately mapping processes and internal flows to identify weaknesses and defining recovery times and the resources needed to restore the normality. In the event of an attack, Whiteready immediately sets up a business continuity plan (BCP - Business Continuity Plan), indicating the steps that led to the event and restoring the pre-existing situation to the highest possible level. In extremely critical situations - for example, data centre fire, cyber attack, ransomware - Whiteready prepares an IT systems recovery plan (DRP - Disaster Recovery Plan)
VA
Vulnerability Assessment
Whiteready is able to detect the presence of weaknesses in corporate hosts without performing any type of attack or system breach, through systems analysis, service enumeration and verification of published vulnerability databases. The Vulnerability Assessment can be applied to different domains: infrastructures and network equipment, wireless, systems (servers with different Microsoft or Unix-like operating systems) or applications (for example web applications, application servers, etc.).
PT
Penetration Test
Vulnerability detection involves a cyber attack simulation phase authorized by the client to avoid a real potential attack.
IR
Incident Response
Incident response (IR) is the effort to quickly identify an attack, minimize its effects, contain damage, and remediate the cause to reduce the risk of future incidents.
Incident response is a set of information security policies and procedures that you can use to identify, contain, and eliminate cyberattacks. The goal of incident response is to enable an organization to quickly detect and halt attacks, minimizing damage and preventing future attacks of the same type.
Compliance Rules
- OWASP (OpenWeb ApplicationSecurity Project) Testing Guide
- NIST Technical Guide to Information Security Testing & Assessment
- SANS Common Weakness Enumeration
- OWASP Top 10
- External Testing (Penetration Test esterni)
- Internal Testing (Penetration Test interni)
- Black/ Grey/White Box
Penetration test protocollo VoIP - Configuration and Deployment Management Testing
Whiteready
European Technology
Award 2021 in Hosting