NewPoint: Consulting, IT & Outsourcing Professional Services
IT Security

Information security: action lines
NewPoint structures its IT security activity along four action lines, defined according to the type of activities each involves and the specialisation necessary to carry them out.
These lines are:
- Consultancy: focused on compliance, regulations and security organisation
- Audits: defined as the validation line for technical and organisational compliance, penetration tests and low level revisions
- Architecture: machinery and security programs, logical security based on physical components
- Solutions: security platforms, large market solutions
Consultancy
- Security Management Plans
- Risk Analysis and Management
- Security Dashboard | Security Indicators Program
- Adaptation to legal regulations (LOPD, LSSI, ENS, etc.)
- Certification ISO 27001 | 27002 | 27005
- Business Continuity (BCP) and Disaster Recovery (DRP) Planning | ISO 22301
- IT Security Outsourcing
- Security Training and Awareness
Architecture
- Perimeter Security
- Security Architecture
- Access Control | NAC
- Security of Business Platforms
- Hardening
- Mobile Device Security
- Development of Secure Applications
- Security Incident Management
- Security Indicators Program
Audits
- Penetration Test:
- White Box
- Black Box
- Grey Box
- Code Audits
- Payment Method Security (PCI-DSS, Payment Card Industry – Data Security Standard)
- Fraud Detection
- eCrime | Cybercrime
- Regulations audit (LOPD)
Solutions
- ISMS Automation Tool - SecurPoint
- Identity and Access Management (IdM)
- Access Rights (IRM)
- Encryption Solutions and Digital Signature
- DLP – Data Loss Prevention
- Sentiment Analysis – Digital Reputation