Martin Hořický
Cyberattacks are becoming more frequent and sophisticated. At the heart of many successful cyberattacks are vulnerabilities that exist in network infrastructure, software applications and the very people who use those networks and applications.
Continuous detection and protection from attacks anytime, anywhere is critical. At BDO, we use a solution from Qualys VM, a cloud-based service that gives you instant global visibility of where your IT systems may be vulnerable to the latest internet threats and how to protect against them. It helps you continuously identify threats and monitor unexpected changes in your network before they turn into a breach.
OUR APPROACH AND SOLUTION:
The output of the test is a final report that includes:
To ensure reliable security, you need a complete, up-to-date and detailed inventory of IT assets.
Our team uses Qualys, a cutting-edge tool that automatically discovers, normalises, and catalogues all the components of your data centre: servers, databases, network elements, storage drives and more. It captures detailed information such as running services, installed software, traffic, hardware/software lifecycles, software licences and vulnerabilities, and publishes this information through custom dashboards, automated reports and search queries.
Martin Hořický