This service allows our consultants to determine if an information system protects data and maintains functionality as intended. It also aims at verifying six basic principles as listed below:
Confidentiality | Integrity | Authentication | Authorization | Availability | Non-repudiation
To find out more, get in touch with one of our consultants directly by clicking on the enquire button.