Select your country

Not finding what you are looking for, select your country from our regional selector:

Rechercher

woman reading on computer

Audit et Pentest

Nos services de Conseil, Audit et Pentest

Le hacking éthique est un service puissant pour aider les entreprises à découvrir leurs vulnérabilités « sur le terrain» et imaginer des scénarios d’attaques sur leurs systèmes d’information. En simulant des attaques réelles et en exploitant les mêmes outils et techniques que ceux employés par les acteurs de la menace, nos ingénieurs qualifiés vous aident à identifier les “trous” de sécurité, à évaluer leurs impacts et leurs conséquences réelles et, au final, à élaborer un plan de remédiation hiérarchisé. 

 

External Audit

Discover vulnerabilities and weaknesses within your external perimeter by simulating attacks that would be performed by external attackers against your exposed systems, such as Web and Email servers, along with any remote access services.

Internal Audit

Evaluate your security level with respects to a malicious insider, a virally compromised workstation or even temporary access to your network by your partners and consultants.

Applicative Audit

Perform an in-depth analysis of an application by not only assessing its resistance towards unauthenticated attackers, but also towards legitimate users by analysing whether access control mechanisms are properly setup to prevent privilege escalation and unauthorised data access.

Défense

Support and maintenance

Orange Cyberdefense provides assistance services on the whole range of products for which it is a partner.

Securing architectures

We help you design and/or plan your information system in a secure way while taking into account your specific constraints. 

Vulnerability scan

Regularly track vulnerabilities impacting your information system. Our insights allow you to prioritize remediation for critical findings.

Investigation

Incident Response & Forensics Analysis

A security incident is the source of stressful situations in which the teams of the company concerned must make quick and precise decisions. With IRFA, Orange Cyberdefense supports you by considering the risk of an event and setting up a mechanism to deal with it. We provide the assistance of qualified and specialized engineers in known response times on pre-established conditions.

Mobile devices

Mobile devices are ubiquitous in enterprise environments. If there is a suspicion of hacking or compromise, Orange Cyberdefense can test your devices to assess their integrity and uncover any traces of malicious activity.

Reverse engineering

Thanks to its unique experience, Orange Cyberdefense is able to analyze unknown strains of malware to identify their key elements, such as their behaviour and sometimes encryption keys. Orange Cyberdefense can also put its reverse engineering skills to use to assess the security level of compiled applications, whether they be written for Windows, Linux, Android or iOS.

Plan

  • Get management support
  • Identify the objectives of the company
  • Define the ISMS perimeter
  • Establish ISMS policies, procedures and key performance indicators
  • Establish the risk assessment methodology

Do

  • Manage risks and create a treatment plan
  • Implement and use ISMS policies and procedures
  • Allocate resources

Check

  • Monitor the ISMS implementation
  • Monitor KPI
  • Internal Audit
  • Creation of supervision reports

Act

  • Periodic re-evaluation
  • Take corrective and preventive measures

Découvrez plus de services de Conseil et Audit

Victime d’un incident ?

Vous faites face à une Cyber attaque ?

24/7/365 nos experts vous accompagnent réponse à incident.