Penetration Testing
We have talented testers for virtually any scenario, a bold claim but true nonetheless. We’ve provided a sample of the types of pen testing we conduct, it’s not exhaustive but gives a flavour of what you can expect from us.
Assessment Services
- Bespoke & Web-based Application Testing
- Web Application Architecture Reviews
- Application Code Reviews
- Testing of mobile devices
- Enterprise Application Security Testing
- Enterprise Database Security Audits
- SCADA Process Control Audits
- VoIP Assessments and Security Consultancy
- Mail Server Deployments
- Infrastructure and Architecture Security Reviews
- Scenario-based Penetration Testing
- Automated Infrastructure & Application Perimeter Scanning
- IT Health Check
- Wireless 802.11x Assessments & Rogue Access Point Identification
- Operating System, Network Device & COTS Application Build Review
- Firewall Rulebase Audit
- Client Security (kiosks, workstations, laptops, mobile devices)
Compliance, Risk and Audit
- PCI ASV Testing
- PCI QSA Audits and Consultancy
- ISO27001 Implementation
- Risk Management
- Business Impact Analysis
- Third Party Risk Assessments
- Business Continuity Management
- IS&T Operational Health Checks
- Best Practice Advice
Physical Security, Data Asset Protection and Privacy Services
- Telephone Based Social Engineering
- Physical Social Engineering
- Building Access Security Audits
- Facilities Management System Reviews
- CCTV Control Reviews
- Open Source Research
- Client Side attacks
- Personal Information Security Protection
- Targeted Trojan / Malware Analysis
- Corporate Resistance to Targeted Attack
- Corporate Public Profile Review
Computer Forensics and Incident Response
- Forensics Analysis
- Information Security Incident Management
- Secure Data Recovery & File Password Cracking
Ongoing Automated Vulnerability Assessment
- External and internal network scanning
- PCI ASV compliant
- Ad hoc or preprogrammed regular scans
- Highly granular scanning runs
IT CISO/Security Manager
- Interim CISO/IT Security Manager
- Mentoring of existing team
- Compliance with PCI requirements
- Fill skill gaps in your current team