• Home
  • Offers and packages
  • Network Infrastructure

Network solutions

A network security audit assesses the resilience of your IT infrastructure against cyberattacks. Bexxo offers 3 packages (Essentiel, Avancé, Premium) compliant with ISO 27002 and NIST CSF, including network mapping, penetration testing and a report with a prioritised action plan.

Classic Packages

At bexxo, we offer three audit levels to assess and strengthen the security of your corporate network infrastructure. Choose the package that best suits your cybersecurity needs, and we will be happy to customize it according to your wishes.

All our packages include post-audit follow-up and assistance in implementing the main recommendations.

ESSENTIEL

Ideal for small businesses or those starting their network security journey

Je suis Intéressé(e)
  • 10-point analysis according to ISO 27002 or NIST CSF
  • Basic network mapping
  • Scan for common vulnerabilities
  • Verification of basic firewall configurations
  • Password policy analysis
  • Network segmentation assessment
  • Simplified report with main recommendations

STANDARD

Recommended for companies requiring a more in-depth analysis

Je suis Intéressé(e)
  • 15-point analysis according to ISO 27002 or NIST CSF
  • All elements of the Essential package
  • In-depth analysis of network equipment configurations
  • External penetration test
  • Wi-Fi security assessment
  • Log and network monitoring analysis
  • Verification of update and patch policies
  • Review of backup and restoration processes
  • Detailed report with prioritized action plan

PREMIUM

The complete solution for large companies requiring the highest level of network security

Je suis Intéressé(e)
  • 20-point analysis according to ISO 27002 or NIST CSF
  • All elements of the Advanced package
  • In-depth internal penetration test
  • Security analysis of critical servers
  • Security assessment of VPN and remote access solutions
  • Verification of compliance with industry-specific security standards
  • Analysis of security and governance policies
  • Incident response assessment
  • Targeted attack simulation (Red Team)
  • Exhaustive report with detailed recommendations
  • Presentation of results to your management team

Secure and optimize your infrastructure

At Bexxo, we offer network solutions tailored to the specific needs of your company to ensure secure and high-performance connectivity. Our experts analyze your existing infrastructure, identify potential vulnerabilities, and implement advanced protection measures to prevent cyberattacks.

icon
Network audit and optimization to enhance security and reliability.
icon
Detection and correction of vulnerabilities to prevent malicious intrusions.
icon
Network management and segmentation for better data protection.
icon
Monitoring and maintenance to anticipate risks and ensure continuous availability.
With Bexxo, benefit from a robust and scalable network solution, adapted to cybersecurity challenges and your company's requirements.
Tailor-made solutions

Tailor-made network solutions for complex projects

Contact us to discuss your specific needs and get a personalized quote.

Our team of experts will be happy to guide you towards the solution best suited to your company.

Contact Me

We will process your personal information in accordance with our privacy policy.

Thank you, your message has been sent successfully.
Error! The message could not be sent.

Frequently asked questions about the network audit

What is a network security audit?

A network security audit is a systematic assessment of a company's IT infrastructure: device mapping, traffic analysis, verification of firewall rules, remote access (VPN) and network segmentation. It is carried out in accordance with ISO 27002 and NIST CSF standards and produces a vulnerability report classified by criticality with a prioritised action plan. At Bexxo, our audits cover 10 to 20 control points depending on the chosen package.

What is the difference between the Essentiel, Avancé and Premium packages?

The three packages differ in their depth of analysis:

  • Essentiel: 10 control points, basic network mapping, automated scan for common vulnerabilities, simplified report — for SMEs beginning their security journey.
  • Avancé: 15 control points, manual intrusion tests, configuration analysis of active devices, detailed report with prioritised action plan.
  • Premium: 20 control points, internal and external penetration tests, attack simulation, full analysis of segmentation and access, presentation of results to management.

All packages include post-audit follow-up and implementation assistance.

Why is the corporate network exposed to cyberattacks?

The corporate network is the primary target for attackers: it provides access to all systems, data and internal communications. Three factors increase SMEs' exposure:

  • Long detection time — the average time to detect a breach is 204 days (IBM Cost of a Data Breach 2024), giving attackers time to exfiltrate data.
  • Default configurations — firewalls, routers and switches delivered with non-hardened settings represent exploitable entry points.
  • Uncontrolled remote access — VPN, remote working and partner access expand the attack surface without always being adequately secured.

Is a network audit mandatory under the Swiss nFADP?

The nFADP (Swiss Federal Act on Data Protection, in force since September 2023) requires companies to implement proportionate technical and organisational measures to protect personal data. Although it does not explicitly require an annual network audit, documentation of security measures is mandatory. In the event of a data breach, the absence of demonstrated diligence can result in fines of up to CHF 250,000 for data controllers. An audit report constitutes this proof of diligence with the Federal Data Protection and Information Commissioner (FDPIC).

How long does a network security audit take?

The duration depends on the package and the size of the infrastructure:

  • Essentiel: 1 to 2 working days for a network of fewer than 50 devices.
  • Avancé: 3 to 5 working days depending on topology complexity.
  • Premium: 1 to 2 weeks for a multi-site infrastructure or complex architecture (VPN, hybrid cloud, OT/IT).

The report is delivered within this timeframe, with a presentation session included for the Premium package.

A network security audit is a systematic assessment of a company's IT infrastructure: device mapping, traffic analysis, verification of firewall rules, remote access (VPN) and network segmentation. It is carried out in accordance with ISO 27002 and NIST CSF standards and produces a vulnerability report classified by criticality with a prioritised action plan. At Bexxo, our audits cover 10 to 20 control points depending on the chosen package.

The three packages differ in their depth of analysis:

  • Essentiel: 10 control points, basic network mapping, automated scan for common vulnerabilities, simplified report — for SMEs beginning their security journey.
  • Avancé: 15 control points, manual intrusion tests, configuration analysis of active devices, detailed report with prioritised action plan.
  • Premium: 20 control points, internal and external penetration tests, attack simulation, full analysis of segmentation and access, presentation of results to management.

All packages include post-audit follow-up and implementation assistance.

The corporate network is the primary target for attackers: it provides access to all systems, data and internal communications. Three factors increase SMEs' exposure:

  • Long detection time — the average time to detect a breach is 204 days (IBM Cost of a Data Breach 2024), giving attackers time to exfiltrate data.
  • Default configurations — firewalls, routers and switches delivered with non-hardened settings represent exploitable entry points.
  • Uncontrolled remote access — VPN, remote working and partner access expand the attack surface without always being adequately secured.

The nFADP (Swiss Federal Act on Data Protection, in force since September 2023) requires companies to implement proportionate technical and organisational measures to protect personal data. Although it does not explicitly require an annual network audit, documentation of security measures is mandatory. In the event of a data breach, the absence of demonstrated diligence can result in fines of up to CHF 250,000 for data controllers. An audit report constitutes this proof of diligence with the Federal Data Protection and Information Commissioner (FDPIC).

The duration depends on the package and the size of the infrastructure:

  • Essentiel: 1 to 2 working days for a network of fewer than 50 devices.
  • Avancé: 3 to 5 working days depending on topology complexity.
  • Premium: 1 to 2 weeks for a multi-site infrastructure or complex architecture (VPN, hybrid cloud, OT/IT).

The report is delivered within this timeframe, with a presentation session included for the Premium package.