While ethical hack is an intrusive security scan, our non intrusive security audit compliments it by focusing on areas the ethical hack cannot. From getting your processor list in place to data classification, network to data flow diagram, fact finding questions to giving you our results in the form of a risk register, security audit covers it all.
Please download our security audit scope guidelines for more details