IS Audit

Support to validate your transformation scenario

JALIX offers a flash diagnosis of your information system to evaluate the conditions of implementation and secure the deployment of solutions.

Our three-stage approach, including audit & diagnosis, specification and publisher consultation facilitation, can be revised according to early decision milestones and is very agile.

The spectrum of our audits is wide: verification of the configuration of a Microsoft hybrid infrastructure, compliance with the RGDP, security compliance, etc., and can make it possible to establish a master plan and/or propose evolution projects with significant gains for the company.

Why conduct an IT security audit?

The development of the Internet, the interconnection of networks and the interconnection of devices are all factors that multiply the IT risks within companies.

Whether it is a question of internal risks (lack of employee awareness, errors and incidents, access to critical data, malicious intent, former employees, etc.) or external risks (viruses, intrusions, phishing, espionage, etc.), the security of the information system is now a major issue in the governance of any structure.

The safety audit is used to :

  • Ensure the integrity of the company's data and information assets.
  • Discovering and understanding possible vulnerabilities in the information system
  • Implementing protection and security policies adapted to the company's operations and its information system.

The role of the security audit is to allow the identification of risks and possible flaws in the company's security system, in order to better correct them and protect against threats, even before they occur.

It is therefore advisable to carry out regular audits of the system, for example once a year, in order to have up-to-date recommendations adapted to the evolution of the company's information system, technologies, uses and threats.

What actions can be taken in a safety audit?

In an IT security audit, the following elements, among others, are examined

  • Equipment: desktops, laptops, tablets, mobile phones
  • Operating systems: their versions, their updates
  • Software and applications (management software, business software, messaging, etc.)
  • Network and telecom infrastructure
  • The risks associated with a possible loss of data integrity,
  • Employee rights and access
  • Backup requirements (hosted, redundant, etc.)
  • Computer security tools (antivirus, firewall, antispam)
  • The company's IT security policy
  • External safety devices

If necessary, intrusion tests can be performed to complete the security audit.