Company information security audit

Shtein Solutions provides general information security (IS) audit services.

This verification is carried out according to protocols that were recommended by the National Cyber Security Authority of Israel.

The basis of this review is the document "Cyber Defense Doctrine 2" compiled by Israel National Cyber Directorate. The questionnaire we compiled based on this document is comprehensive and shows a complete picture of information security in the enterprise, for the management of the company and for further actions to ensure information security.

The results of the audit can provide a good basis for planning information security activities in the organization for the coming years.

As part of the support service, we create an up-to-date risk map based on inspections, with recommendations and suggestions on what to solve, in what order, and how.

Protect your business - We are ready to help

Contact Us

Our Services

Our company provides the following services:

Consulting and support

Primary technological and basic checks in the field of information security. Inspection of the network architecture, security systems, access rights. Construction of a risk map.

More Details

Penetration Tests

This test identifies existing vulnerabilities in the infrastructure in order to formulate recommendations for their elimination.
 

More Details

Phishing Security Test

Testing using social engineering methods. The purpose of the test is to identify the staff’s level cyber security threat awareness.
 

More Details

Cyber training and practice

Lectures and trainings on staff awareness of information security threats, as well as trainings on secure development for programmers.
 

More Details

Information Security Audit

Checking the security of the company according to the protocol. The purpose of the audit is to show in which areas of information security there are shortcomings and how to correct them.

More Details

Incident Investigation

When a cyber incident occurs, it is important to understand exactly what happened and how, and to address the causes and gaps in the firm's information security.

More Details

About us in numbers

Since 2010, we have done a lot of work. This includes penetration tests and security audits, risk management, incident investigations, as well as consultations and solution design.

0

Years of experience

> 0

Projects completed

0

Happy Clients

0

Cups of Coffee