The analysis of infrastructure and existing IT assets management processes in terms of cybersecurity. This technology involves standard threat metrics that accumulate the best world practices.
Result. Report on potential threats to IS in terms of unlicensed and non-updated software.