
Information security mapping
Book a free consultation today to discuss about information security with an expert!
Information security mapping
Our information security mapping is an excellent way to ensure the information security of the site or server. In the mapping, we use direct access to the server, which enables more efficient and thorough testing than usual. Information security mapping can be implemented in basic or extensive format.
This is how information security mapping proceeds
1
The first step in information security mapping is to limit the use of ports, which reduces the number of vulnerabilities.
2
Next, the mapping focuses on a point prone to vulnerabilities, which is made to look like it is located elsewhere with the help of a CDN (Content Delivery Network).
3
We provide the possibility to add WAF services (Web Application Firewall) and secure the local server to the CDN.
4
We perform a follow-up test and make sure that the ports are closed, no unnecessary services are running and that the TLS/SSL encryption is at an optimal level.
Book a free consultation today
The service is provided by hostek.com

Information security mapping options
If you are not sure which package to choose, contact our customer service.
Basic check (annually) | Detailed check (annually) | Check to be performed every three months | |
Identification of current security threats and the creation of a comprehensive action plan | |||
Assessment and documentation of servers, applications, and security requirements | |||
Secure/isolated management access (VPN, source IP lockdown) | |||
Disabling unnecessary services on application or database servers | |||
Locking down public IP ports | |||
Evaluation and securing of the application layer (SSL/TLS) | |||
Verification of the current antivirus installation and version (EICAR test) | |||
Verification of backup restoration | |||
Code and application review for performance and vulnerabilities | |||
Performance and vulnerability testing of web applications. Updates and patches | |||
Assessment of system resource usage and system logs. Updates and patches | |||
Intrusion testing, vulnerability scanning, SQL injection scanning | |||
Port scanning and intrusion testing | |||
Cross-site scripting (XSS) vulnerability testing | |||
PDF report of scans |
**Note** all information security mappings include assistance to solve possible information security threats that are found