A security review examines all IT systems on a broad scale. As a result, you receive a detailed report of what was examined and where security vulnerabilities were found.
A Security Review inspects IT systems and applications for vulnerabilities. Codepurple's specialists try to penetrate your systems (penetration test) and thus identify security breaches.
Together with the customer we define the scope of the Security Review. The systems to be examined are identified and the time frame is defined. After the analysis and penetration tests have been carried out, the results are discussed with the client in a debriefing.
The cost depends on the scope of the Security Review and the number of systems. The scope is determined with the customer.
The result of the review is a detailed report, which records all the checks performed and their results.
With every change to the system, new potential vulnerabilities can arise. After major updates, it is recommended to perform an extensive review. This allows new security vulnerabilities to be identified at an early stage.
In the Security Review, we take a broad look at all IT systems. It gives you an overview of the overall state of your systems. With the Closed Bug Bounty, we only examine the systems where we see specific attack scenarios.
Both your financial risk and the risk that your IT systems are no longer available is small. Thanks to the defined scope, the costs are clearly defined. Hackers act like surgeons, their aim is not to cause damage, but to find vulnerabilities and not to interfere with the IT systems.
The term hacker often has a negative connotation. This is unjustified. Most hackers have no evil or criminal intentions. So the term "ethical hacker" or "white-hat hacker" has become established for the friendly hackers.
Ransomware dominates the threat landscape for SMEs.