network security audits, penetration testing and vulnerability assessments. assess your risk to hackers or internal policy violation