It is similar to a penetration test, but more comprehensive than a penetration test. The aim of the study is not to find as many vulnerabilities as possible. It aims to test the organization’s ability to prevent cyber security vulnerabilities. The attack on the previously focused area is carried out secretly and simultaneously as a team. The target can be an employee external to the system, and many techniques, including social engineering, are used.
Within the scope of the Law No. 6698 on the Protection of Personal Data published
Find out moreDuring the penetration test, we ensure the security of your information system by taking advantage
Find out moreWhen a security breach or cyber-attack occurs within your business; after the end of this
Find out more