Une question ? Contactez notre standard : 01 41 91 58 61 - Un incident de sécurité ? Faites-vous assister : 01 47 28 38 39

Pentest

With Pentest testing, our experts attack your information system or specific elements, identify weaknesses in several scenarios and provide you with appropriate recommendations.

ANSSI Intrinsec intrusion test security VISA

Since November 2017, Intrinsec has been PASSI RGS qualified (attestation n°20007) and PASSI LPM qualified (qualification decision n°5685) for its organizational and physical audit, configuration, architecture, source code and penetration testing activities.

What perimeters?

Our penetration tests can be adapted to your needs and those of your company, by searching for vulnerabilities on different perimeters.

R

Datacenters, corporate networks, WiFi, telecom and VoIP networks, private or public clouds

R

Specific systems (terminals, BMS systems, ICS/SCADA, etc.)

R

Fixed and mobile terminals (Android, iOS, MDM)

R

Web, native and mobile applications, hosted on-premise or by leading cloud providers

R

Connected objects: IOT chain security, from object to platform, and communication protocols

Which Pentest for your company?

External

Test the ability of an opportunist, a malicious customer, a third-party maintainer or a specialized attacker to compromise your information systems, either directly or by bouncing off your partners or collaborators.

Internal

Evaluate the resistance of your infrastructures to protect your business and your information against several scenarios: visitor, trainee, employee or consequence of the compromise of an asset from the outside.

Application

Measure the security of your applications against technical or business logic attacks, according to OWASP. We also apply specific checkpoints for applications hosted at Amazon AWS, Google Cloud, Microsoft Azure or OVH.

Mobile

As part of the mobile penetration test, our experts identify the risks specific to your mobile applications.

IoT

Test the security of the entire IoT chain for your connected solutions. From the connected object to the platform, our security experts identify the vulnerabilities specific to your hardware & software solution and provide you with expertise to raise your level of security.

I want more information!

Leave us a message describing your security needs, or contact us if you’d like information about our activities.

Don’t forget to enter your e-mail address or telephone number so that we can contact you as soon as possible.

Verified by MonsterInsights