IT Security Audit

An IT Security Audit is a comprehensive assessment of an organization’s security posture and IT infrastructure. Conducting an IT Security Audit helps organizations find and assess the vulnerabilities existing within their IT Networks, Connected Devices, and Applications. It gives you the opportunity to fix security loopholes and achieve compliance.

DcData provides both AD HOC and recurring Vulnerability Scanning, checks and assessments for compliance reporting. Combined with over 20-years of experience, we offer products from the World's leading Security Vendors such as Tenable, Qualys, Intruder, Fortigate, OPNsense, ESET, F-Secure and more, providing vendor-backed, certified protection and assessment.

DcData also works closely with leading Legal Firms to assist your organization with POPI Compliance. In addition to Security Breach prevention, DcData also offers Cloud-Based Backup and DR services as well as Cyber Security Breach post mortem analysis and lock-down.

Black Box Audit

In this type of Security Audit, the only information the auditor knows, is the information that is publicly available regarding the clients organization.

White Box Audit

In this type of Security Audit, the auditor is provided with detailed info (i.e. Source Code, Employee Access, and more) regarding the Organization.

Grey Box Audit

In this type of Security Audit, the auditor is provided with some information from the Organisation to begin the auditing process. This information can also be gathered by the auditors themselves but is provided by the Organisation to save time.

Penetration Tests

The auditor tries to break into the organization’s infrastructure.

Compliance Audits

Only certain parameters are checked to see if the organization is complying with security standards.

Risk Assessments

An analysis of critical resources that may be threatened in case of a security breach.

Vulnerability Tests

Necessary scans are performed to find possible security risks. Many false positives may be present.