w--- layout: page title: Assessments ref: assessments parent: services parenthero: true tagline: How will your application/network cope when attacked? summary: 'You are only as good as your last penetration test. Let us look at your infrastructure and uncover any risks you might be unaware of.' slidesummary: 'Our expertise and passion involves infiltrating networks and applications for our customers, so that they understand what an attack feels like and also how they should act. Is it your time?' cta: Get Assessed Now order: 1 priority: 0.7 ---

Internet Footprinting

As your business grows, so does your attack surface area. One key task attackers perform is to gather as much information about your company as possible. From learning your security posture, to how your employees act on the Internet, collecting as much information as possible is required for an attack.

We make use of Open Source intelligence sources, coupled with over a decade of experience in mapping out a companies Internet posture. The end result is a deliverable of what you look like on the Internet.

Security Assessments

A security assessment usually includes some form of penetration testing, but it takes a more formal and systematic approach and provides a comprehensive view of where all the exploitable vulnerabilities are and what actions should be taken to remediate them. This makes the assessment a very valuable exercise for decision makers, presenting them with a point-in-time view of your security posture. This view can change rapidly as new attack vectors are developed, as the target itself changes or even the issues are remediated. Our assessments look at the entire OSI Model, from layer one up to layer 7 and we have extensive experience in discovering flaws in each layer.

Goal-Orientated Penetration Testing (Red Team)

When performed correctly, a penetration test is an attempt to compromise a specific system, set of systems or gain access to data. This exercise mimics the approach that attackers would take when targeting your organisation, but in a more controlled manner. The aim of our Goal-Orientated approach is to allow you to answer two questions: β€˜can we be compromised?’ and β€˜are we able to react accordingly when we are?’ We work with you to draw up a series of threats that concern you and then set about proving the likelihood of them being exploited. This service makes use of attack scenarios and real-world techniques. This is the closest thing to being attacked by a real-world adversary.

Wireless

Wi-Fi vulnerabilities have the potential to cause more damage than traditional wired networks. With most devices today making use of Wi-Fi, creating adhoc wireless networks is all too easy. Through our Wireless Security Assessments we will locate all access points and rogue devices and analyse the vulnerabilities that could result in a compromise. Often these relate to device configuration errors, out-dated patching, policy and architecture design.

Mobile Security

I'm sure there's an app for that!!
As mobile phone usage continues to grow at an outstanding rate, we've fine-tuned our capabilities to deliver end to end mobile security assessments of platforms, handsets and applications.