AUDITING

Vulnerability Analisys and Pentesting
WHAT IS IT?
Vulnerability analysis and penetration testing aims to evaluate the security of systems, enterprise networks and applications by simulating external and internal attacks and verifying the results of these attacks.
PENTESTING
WHAT IS IT?
Vulnerability analysis and intrusion testing aims to assess the security of systems, enterprise networks and applications by simulating external and internal attacks and verifying the results of such attacks.
It involves analyzing potential vulnerabilities and their likelihood and ease of exploitation to gain illegitimate access to some type of system, application, or even information.
FORENSIC ANALYSIS
WHAT IS IT?
Forensic Analysis is the use of various analysis and investigation techniques to identify, collect, examine and preserve some type of digital information. Its purpose is to find evidence of a certain type of activity and report it so that it can finally be used to different ...
FORENSIC ANALYSIS
WHAT IS IT?
Forensic Analysis is the use of various analysis and investigation techniques to identify, collect, examine and preserve some type of digital information. Its purpose is to find evidence of a certain type of activity and report it so that it can finally be used to different purposes, judicial or otherwise, to explain the current state of a given digital evidence.
PHISHING SIMULATIONS
PHISHING SIMULATIONS
WHAT IS IT?
WHAT IS IT?
Social engineering, in the context of information security, refers to manipulating people to take actions or disclose sensitive information. The goal is to exploit people's lack of knowledge or confidence, to reach a particular goal, whether to reveal confidential information, expose too much information or even click a malicious link.
Social engineering, in the context of information security, refers to manipulating people to take actions or disclose sensitive information. The goal is to exploit people's lack of knowledge or confidence, to reach a particular goal, whether to reveal confidential ...
MORE +
INTEGRATION
INTEGRATION
WHAT IS IT?
WHAT IS IT?
In the context of projects developed with its customers, and combining their technological knowledge, sometimes the need arises to integrate a technological information security solution, to optimize production processes or to respond to customer needs in the ...
In the context of projects developed with its customers, and combining their technological knowledge, sometimes the need arises to integrate a technological information security solution, to optimize production processes or to respond to customer needs in the protection of their assets.
OUR
CONTACTS
CONTACTS

RUA QUINTA DO PINHEIRO, EDIFÍCIO TEJO,
Nº16 2º E, 2790-143 CARNAXIDE
PHONE:
(+351) 214 146 810
FAX:
(+351) 214 146 819
EMAIL:
geral@drc.pt