Below is a list of features of our automated audit solutions for enterprises. The list depends on the size of your company and the scope of audit you want for your IT audits.
SYLink Audit VM | SYLink Audit Small | SYLink Audit Case | ||
---|---|---|---|---|
Risk Audit on Websites |
|
|
|
|
GDPR Compliance Audit on Websites |
|
|
|
|
Risk Audit on Public IP addresses |
|
|
|
|
Data Leakage Audit by email or domain |
|
|
|
|
Risk Audit on network devices (PC / Server / Copiers / etc.) |
|
|
|
|
Risk Audit on Active Directory |
|
|
|
|
WiFi Audit with attack testing |
|
|
|
|
Audit of files on media devices (USB, Disk) |
|
|
|
|
Audit of Internet protection controls |
|
|
|
|
Verification Audit of DDOS attacks |
|
|
|
|
Verification Audit of remote services by Brute force |
|
|
|
|
Risk Audit on Office 365 |
|
|
|
|
Phishing Campaign Management |
|
|
|
|
Standalone solution with Internet connection (80GB/month) |
|
|
|
|
Geolocation of equipment (autonomous with 3 months via Sigfox and LoRa) |
|
|
|
|
Public VPN management for audits |
|
|
|
|
Audit Visualization on SYLink AI portal |
|
|
|
|
Management and generation of PASSI-type reports in PDF |
|
|
|
|
Management and generation of Design reports for management in PDF* |
|
|
|
|
Audit report with white label (your logo) |
|
|
|
|
Risk Audit on Websites
GDPR Compliance Audit on Websites
Risk Audit on Public IP addresses
Data Leakage Audit by email or domain
Risk Audit on network devices (PC / Server / Copiers / etc.)
Risk Audit on Active Directory
WiFi Audit with attack testing
Audit of files on media devices (USB, Disk)
Audit of Internet protection controls
Verification Audit of DDOS attacks
Verification Audit of remote services by Brute force
Risk Audit on Office 365
Phishing Campaign Management
Standalone solution with Internet connection (80GB/month)
Geolocation of equipment (autonomous with 3 months via Sigfox and LoRa)
Public VPN management for audits
Audit Visualization on SYLink AI portal
Management and generation of PASSI-type reports in PDF
Management and generation of Design reports for management in PDF*
Audit report with white label (your logo)
The SYLink AI management platform, which is simple and intuitive, provides a comprehensive view of the network and its connected objects (connected screens, POS terminals, cameras, etc.). It centralizes device information across all remote sites, provides clear information for immediate decision-making, and improves employee productivity through workflow optimization.
Below is a list of features of our audit solutions. The list depends on the scope you want to audit.
Advantages:
Computing power, autonomy, and speed for performing your audits. The Pentester's 'Swiss Army Knife' that assists and performs 80% to 90% of the work. 300 to 400 IPs per day! Perform audits quickly on large volumes of IPs with multiple integrated features and automatic generation of PDF reports!
Use Case Example:
You are a Pentest expert, integrator, or a company specialized in cybersecurity with a large volume of audits to perform for your clients. Capitalize on the management of your different audits and organize your reports and action plans!
Advantages:
You need to perform audits without tight deadlines. The Pentester's 'Swiss Army Knife' that assists and performs 80% to 90% of the work. 80 to 100 IPs per day! You can perform various types of audits with multiple integrated features and automatic generation of PDF reports!
Use Case Example:
You have a company with multiple sites, or you are an integrator looking for regular and automated audits with a comparative dashboard to track the evolution of your security. Easily schedule your audits to monitor the developments in your IT security. Compare audits easily to track the actions of your IT partners in your cybersecurity efforts!
Advantages:
Regular and automated audits with a comparative dashboard to track the evolution of your security. Easily schedule your audits to monitor the progress of your IT security. Compare audits effortlessly to track the actions of your IT partners in your cybersecurity efforts.
Use Case Example:
If you are a company or a group with significant cybersecurity needs and tracking KPIs, integrate our Audit VM and schedule regular audits of your networks, portals, and websites. Send the reports to your service providers for remediation. The objective is the continuous improvement of company security.