Close
uniunea europeana
guvern
POC
Instrumente-Structurale-logo
home slider 2
02
home slider 1
Full 1

Dataeye IT Services

Your IT Security Partner

Full 1
Full 2

Dataeye

Your IT Security Partner

Full 2
Full 3

Dataeye

Your IT Security Partner

Full 3
previous arrow
next arrow

IT SERVICES

Vulnerability Assessment

servicii it evaluarea vulnerabilitatilor

Vulnerability assessment services are provided using specific software solutions such as Qualys, Rapid7, Nessus to identify known vulnerabilities within applications and IT security equipment. The report contains a list of vulnerabilities that must be addressed and the technical methods for addressing them. The reports generated by the software solutions used for scanning will also be attached to the report.

Penetration Testing

servicii it test de penetrare
Penetration tests are performed to determine potential vulnerabilities in computer applications, web pages, online stores. Our approach is holistic and includes Discovery, Evaluation of Vulnerabilities, Exploitation of Vulnerabilities, Testing of Applications in unauthenticated and authenticated mode, Evaluation of Mobile Applications, Test Report, Confirmation of solving identified problems. The need to perform penetration tests is highlighted by specific requirements in the current legislation:
  • General Data Protection Regulation;
  • Rule 4/2018 of the Financial Supervision Authority;
  • BNR Regulation number 3 implemented by Order 553/2019 of the ADR;
  • The NIS directive implemented by law 362/2018 and related DNSC norms.
Dataeye has received ADR authorization and you can find it on the list of IT Auditors here.
Dataeye received ASF certification number 22/24.03.2020 and you can find it on the list of IT Auditors here.

IT Security Audit

audit securitate IT
We will carry out actions to evaluate the technical and organizational controls implemented to comply with the standards and legislation in force. We will evaluate the IT system starting from the architecture, network, servers, virtual machines, applications and databases, policies, procedures and documents from the point of view of confidentiality, integrity, availability, resilience and business continuity. The need to carry out such Audit operations is highlighted by specific requirements in the current legislation:
  • General Data Protection Regulation;
  • Rule 4/2018 of the Financial Supervision Authority;
  • BNR Regulation number 3 implemented by Order 553/2019 of the ADR;
  • The NIS directive implemented by law 362/2018 and related DNSC regulations.
Dataeye has received ADR authorization and you can find it on the list of IT Auditors here.
Dataeye has received ASF certification number 22/24.03.2020 and you can find it on the list of IT Auditors here.
Dataeye has received the General Cyber ​​Security Auditor attestation and was registered in the National Register of Cyber ​​Security Auditors (RENASC) with the identifier IDASC QC-18310A7. Dataeye can thus carry out Cyber ​​Security Audit operations for Essential Service Operators according to the provisions of the legislation in force, Law 362/2018 (NIS Directive).