To highlight all types of security vulnerabilities related to your telephone, ERP and messaging infrastructure.
Our experts perform manual audits of your infrastructure. Each audit is different and tailor-made according to needs. Our experts identify the security flaws in your telephone, ERP and messaging infrastructure one by one. They thus protect the confidentiality of your exchanges.
By relying on reference tools such as the TOP 10 OWASP, our cyber-experts identify the configuration errors of your telephone, ERP and messaging infrastructure, the errors of your systems and applications, as well as the flaws present in the your entire infrastructure.
Our experts will assist you in defining the scope of the audit of your digital communication infrastructures.
TOIP / VOIP audit
We audit your entire IP based phone infrastructure: IPBX (Internet Protocol Private Branch eXchange), Virtual LAN, workstation, switches, taxation server, recorders and even more according to your organization.
Communication systems such as Cisco, Avaya, Alcatel, NICE, SIP.
SAP / ERP audit
As ERP software is used daily in your company, make it audited entirely to detect its vulnerabilities: not only the databases, the system, the network, the encryption, the application server, the accounts, the passwords but also GIU, batches, APIs.
Exchange / Webmail audit
Your mail is an entry point for hackers. To audit the configuration and the administration of your email service is crucial. Our experts realize complete audits: rights, passwords, patches, files, system, backup and existing protections (antivirus and antispam).
Simple Mail Transfer Protocol SMTP, Outlook Web Access OWA, Microsoft Exchange et d’autres en fonction de votre organisation.
Depending on the business procedures and your telephone, ERP and Messaging infrastructure that you use within your organization, our experts will define with you the scope to be audited.
The security flaws in your infrastructure will be highlighted and characterized by level of danger so that you can quickly deal with the most sensitive.
Just as a hacker might do, our "ethical hackers" will simulate attacks against your organization through your telephone, ERP and email infrastructure to identify new security breaches.
For each flaw detected, you will be notified of corrective action to quickly secure your entire infrastructure.
Following the audit of your organization, our experts will provide you an audit synthesis, including the following points :
Our experts check afterwards if the corrections have been applied properly, in order to deliver the Ziwit Consultancy Services certification valid for 1 year. This certification is a real guarantee of trust that you can assert to your partners, investors, regulatory authorities or any other stakeholder wishing to ensure the integrity, security and reliability of your IT system.
Our team of IT security experts is ready to offer you the audit that best suits your needs and your business.