{"id":6615,"date":"2023-10-03T14:21:30","date_gmt":"2023-10-03T12:21:30","guid":{"rendered":"https:\/\/www.faster.cz\/produkt\/bezpecnostni-operace\/"},"modified":"2024-08-16T10:36:25","modified_gmt":"2024-08-16T08:36:25","slug":"security-operations","status":"publish","type":"produkt","link":"https:\/\/www.faster.cz\/en\/product\/security-operations\/","title":{"rendered":"Security Operations"},"content":{"rendered":"\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-btn-submenu\"><a class=\"wp-block-button__link wp-element-button\" href=\"#skenovani-zranitelnosti\">Vulnerability Scan<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-btn-submenu\"><a class=\"wp-block-button__link wp-element-button\" href=\"#penetracni-testovani\">Wi-Fi Penetration Testing | Internal and External Network<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-btn-submenu\"><a class=\"wp-block-button__link wp-element-button\" href=\"#socialni-inzenyrstvi\">Social Engineering<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"skenovani-zranitelnosti\">Vulnerability Scan<\/h2>\n\n\n\n<p>We provide organizations with risk and threat management, monitoring and evaluating known and unknown vulnerabilities to close security holes in a timely manner.<\/p>\n\n\n\n<p><strong>Service detail<\/strong><\/p>\n\n\n\n<ul class=\"is-style-list-square wp-block-list\">\n<li>Internal and external network vulnerability analysis, vulnerability reporting and compliance check<\/li>\n\n\n\n<li>Security vulnerability scanning using a combination of manual testing and automated security scanner<\/li>\n\n\n\n<li>Vulnerability management by system, identifying severity of findings, likelihood of exploitation by attackers, and level of sophistication for vulnerability remediation<\/li>\n\n\n\n<li>Support for setting up processes for effective vulnerability remediation and security incident prediction<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"penetracni-testovani\">Wi-Fi Penetration Testing | Internal and External Network<\/h2>\n\n\n\n<p>We identify security threats, risks and vulnerabilities in IS architecture using simulated hacker attacks.<\/p>\n\n\n\n<p>We analyze the state of resilience of companies against cyber-attacks through human factor abuse and network and application level attacks from the external environment.<\/p>\n\n\n\n<p><strong>Service detail<\/strong><\/p>\n\n\n\n<ul class=\"is-style-list-square wp-block-list\">\n<li>Penetration testing of servers, publicly available services, mobile devices, VoIP, applications, IT\/OT devices, SCADA systems, clouds and infrastructure<\/li>\n\n\n\n<li>Continuous testing of organisations&#8217; communication interfaces, hardware and software<\/li>\n\n\n\n<li>Malware attack simulation, phishing test, login credential cracking, malicious code infiltration and more<\/li>\n\n\n\n<li>Object vulnerability detection and simulated hard test of physical attack on assets and health<\/li>\n\n\n\n<li>Moderated reporting with drafting of corrective action implementation in accordance with internal guidelines, BCRs, ISO certifications and NIS2 transposition<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"socialni-inzenyrstvi\">Social Engineering<\/h2>\n\n\n\n<p>The human factor, employees and management of companies are a major security risk. We conduct concentrated attacks simulating social engineering tools, specifically mail phishing, spear phishing and physical infiltration of user endpoints. The operations are followed by training to evaluate the impact of the simulated attacks we have performed.<\/p>\n\n\n\n<p><strong>Service detail<\/strong><\/p>\n\n\n\n<ul class=\"is-style-list-square wp-block-list\">\n<li>Testing the resilience of the entire organizations environment to attacks (the goal is not to identify vulnerabilities in a specific area or department)<\/li>\n\n\n\n<li>Penetration by exploiting vulnerabilities through social engineering using current hacking techniques integrating information gathering from open sources with AI\/artificial intelligence support (e.g. OSINT, ChatGPT, Chatsonic), darkweb digital identity marketplace and other sources<\/li>\n\n\n\n<li>We use AI tools to prevent trusted identity spoofing, website scams and unique codes against malicious content detection<\/li>\n\n\n\n<li>Detailed monitoring of recipients&#8217; reactions and access to spoofed content as part of the service<\/li>\n\n\n\n<li>Verification of employees&#8217; knowledge using social engineering techniques in the use of unauthorized technologies in the organization, compliance with BYOD policies, verification of the level of security of Mobile Devices Management (blocking of access systems to company data, status of compliance with policies or mobile device management server) and the level of employee cooperation in case of identification of a security incident<\/li>\n<\/ul>\n","protected":false},"featured_media":0,"template":"","kat":[89],"class_list":["post-6615","produkt","type-produkt","status-publish","hentry","kat-cyber-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security Operations - Faster.cz<\/title>\n<meta name=\"description\" content=\"We provide risk and threat management, monitor vulnerabilities, and remediate weaknesses. We use simulated attacks including social engineering.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.faster.cz\/en\/product\/security-operations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Operations - Faster.cz\" \/>\n<meta property=\"og:description\" content=\"We provide risk and threat management, monitor vulnerabilities, and remediate weaknesses. We use simulated attacks including social engineering.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.faster.cz\/en\/product\/security-operations\/\" \/>\n<meta property=\"og:site_name\" content=\"Faster.cz\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Fastercz\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-16T08:36:25+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Fastercz\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.faster.cz\\\/en\\\/product\\\/security-operations\\\/\",\"url\":\"https:\\\/\\\/www.faster.cz\\\/en\\\/product\\\/security-operations\\\/\",\"name\":\"Security Operations - Faster.cz\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.faster.cz\\\/#website\"},\"datePublished\":\"2023-10-03T12:21:30+00:00\",\"dateModified\":\"2024-08-16T08:36:25+00:00\",\"description\":\"We provide risk and threat management, monitor vulnerabilities, and remediate weaknesses. We use simulated attacks including social engineering.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.faster.cz\\\/en\\\/product\\\/security-operations\\\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.faster.cz\\\/#website\",\"url\":\"https:\\\/\\\/www.faster.cz\\\/\",\"name\":\"Faster.cz\",\"description\":\"...\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.faster.cz\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Operations - Faster.cz","description":"We provide risk and threat management, monitor vulnerabilities, and remediate weaknesses. We use simulated attacks including social engineering.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.faster.cz\/en\/product\/security-operations\/","og_locale":"en_US","og_type":"article","og_title":"Security Operations - Faster.cz","og_description":"We provide risk and threat management, monitor vulnerabilities, and remediate weaknesses. We use simulated attacks including social engineering.","og_url":"https:\/\/www.faster.cz\/en\/product\/security-operations\/","og_site_name":"Faster.cz","article_publisher":"https:\/\/www.facebook.com\/Fastercz\/","article_modified_time":"2024-08-16T08:36:25+00:00","twitter_card":"summary_large_image","twitter_site":"@Fastercz","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.faster.cz\/en\/product\/security-operations\/","url":"https:\/\/www.faster.cz\/en\/product\/security-operations\/","name":"Security Operations - Faster.cz","isPartOf":{"@id":"https:\/\/www.faster.cz\/#website"},"datePublished":"2023-10-03T12:21:30+00:00","dateModified":"2024-08-16T08:36:25+00:00","description":"We provide risk and threat management, monitor vulnerabilities, and remediate weaknesses. We use simulated attacks including social engineering.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.faster.cz\/en\/product\/security-operations\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.faster.cz\/#website","url":"https:\/\/www.faster.cz\/","name":"Faster.cz","description":"...","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.faster.cz\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.faster.cz\/en\/wp-json\/wp\/v2\/produkt\/6615","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.faster.cz\/en\/wp-json\/wp\/v2\/produkt"}],"about":[{"href":"https:\/\/www.faster.cz\/en\/wp-json\/wp\/v2\/types\/produkt"}],"wp:attachment":[{"href":"https:\/\/www.faster.cz\/en\/wp-json\/wp\/v2\/media?parent=6615"}],"wp:term":[{"taxonomy":"kat","embeddable":true,"href":"https:\/\/www.faster.cz\/en\/wp-json\/wp\/v2\/kat?post=6615"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}