The steps of the service are as follows:
- Analysis: After collecting data about the organization, system configurations are audited and status of the organization is detected to see the weaknesses.
- Simulation: This step is to examine all of the IT infrastructure and cyber security solutions of the organization with an attack simulation.
- Reporting: The results of first two steps are reported.
- Improvement: A roadmap is prepared according to the result report and the hardening works starts.