Every computer system is exposed to a risk of intrusion.
Our job is to evaluate the extent of this risk in time and to field what is needed to reduce the possibility of this risk turning into a threat…
Over the last decade, characterized by a remarkable increase of services provided on the Internet, the exposure to the risk of unauthorized incursions into one’s systems has obviously increased.
Telsy provides various services in this area depending on the type of system to be analysed.
Essentially, Telsy’s activities are:
- Evaluation of the attack surface
- Evaluation of application technologies
- Safety assessment
- Lateral movement starting from compromised systems
- Report on the activities carried out