Revisions de seguretat
Config MDM, postura d'endpoints, abast d'identitat, estat dels pegats i exposició de dades — troballes per impacte i esforç, no per gravetat teòrica.
I look at device fleets the way an attacker would — asking what can be reached, what’s not configured, and what a compromised endpoint would expose.
What a review covers
- MDM configuration audit: what profiles are deployed, what gaps exist
- Endpoint posture: encryption, firewall, SIP, Gatekeeper, secure boot
- Identity and access: SSO scope, privileged access, offboarding processes
- Data exposure: what’s on-disk, what syncs to cloud, what leaves the network
- Patch posture: OS versions, app versions, known CVEs in your tooling
Output
A written report with findings ranked by impact and effort, specific remediation steps, and a follow-up call to work through questions.
What this isn’t
A penetration test. I don’t exploit live systems or simulate attacks. This is a configuration and posture review — written, specific, and actionable.
✍️ Parlem
Preparat per definir l'abast? Escriu-me directament.
Email: adam@mpc.ad
Telèfon: +376 647 764
WhatsApp: +376 647 764