2

Penetration Testing & IT Health Checks

We offer full and comprehensive Penetration Testing and IT Health Check services through our partner CHECK scheme companies and consultants and who carry CREST and Tigerscheme accreditations. All our partner testers are senior consultants with many years’ experience in providing penetration testing services to all markets.

Most of our partner consultants are trained and qualified as either CREST or Tigerscheme Team Leaders, therefore they are of the highest calibre possible.
List of our Services include

Information Security Assessment Services
•Bespoke & Web-based Application Testing
•Web Application Architecture Reviews
•Application Code Reviews
•Testing of mobile devices
•Enterprise Application Security Testing
•Enterprise Database Security Audits
•SCADA Process Control Audits
•VoIP Assessments and Security Consultancy
•Mail Server Deployments
•Infrastructure and Architecture Security Reviews
•Scenario-based Penetration Testing
•Automated Infrastructure & Application Perimeter Scanning
•CESG Check IT Health Check
•Wireless 802.11x Assessments & Rogue Access
•Point Identification
•Operating System, Network Device & COTS
•Application Build Review
•Firewall Rule base Audit
•Client Security Testing (kiosks, workstations, laptops, mobile devices)
•Wardialling
•Information security Reviews
•VPN / RAS Architecture Review

Security Awareness Workshops
•Secure Coding Workshop
•Social Engineering Workshop
•PCI DSS Workshops
•Information security workshops

Physical Security, Brand Attack & Privacy Services
•Telephone Based Social Engineering
•Physical Social Engineering
•Building Access Security Audits
•Facilities Management System Reviews
•CCTV Control Reviews
•Open Source Research
•Client Side attacks
•Personal Information Security Protection
•Targeted Trojan / Malware Analysis
•Corporate Resistance to Targeted Attack
•Corporate Public Profile

Computer Forensics and Incident Response
•Forensics Analysis
•Information Security Incident Management
•Secure Data Recovery & File Password Cracking

Compliance, Risk and Audit
•PCI ASV Testing
•PCI QSA Audits and Consultancy
•ISO27001 Implementation
•GSX CoCo testing
•Risk Management
•Business Impact Analysis
•Third Party Risk Assessments
•Business Continuity Management
•IS&T Operational Health Checks
•Best Practice Advice

Ongoing Automated Vulnerability Assessment
•External and internal network scanning
•PCI ASV compliant
•Ad hoc or preprogrammed regular scans
•Highly granular scanning runs

Lets talk about your IT Security options

Our team of industry experts are here to help you with your new or existing solutions