Risk Assessment

It helps determine quantitative and qualitative risks arising from potential sources of danger, in probabilistic terms, by mapping your security device (defined as the set of technologies, people, processes and infrastructures used for security), by evaluating each analysed area and analysing the gap between the current device and the one you expect to be supplied with, namely, once the threat analysis has been carried out, it is possible to measure the gap between the device currently in use and the needed to face the threat, with appropriate suggestions for mitigating or transferring risk.

This is achieved by always balancing efficiency, effectiveness and sustainability, and in compliance with the ISO/IEC 27002 standard on information security.