No products in the cart.
No products in the cart.
We offer full and comprehensive Penetration Testing and IT Health Check services through our partner CHECK scheme companies and consultants and who carry CREST and Tigerscheme accreditations. All our partner testers are senior consultants with many years’ experience in providing penetration testing services to all markets.
Most of our partner consultants are trained and qualified as either CREST or Tigerscheme Team Leaders, therefore they are of the highest calibre possible.
List of our Services include
Information Security Assessment Services
•Bespoke & Web-based Application Testing
•Web Application Architecture Reviews
•Application Code Reviews
•Testing of mobile devices
•Enterprise Application Security Testing
•Enterprise Database Security Audits
•SCADA Process Control Audits
•VoIP Assessments and Security Consultancy
•Mail Server Deployments
•Infrastructure and Architecture Security Reviews
•Scenario-based Penetration Testing
•Automated Infrastructure & Application Perimeter Scanning
•CESG Check IT Health Check
•Wireless 802.11x Assessments & Rogue Access
•Point Identification
•Operating System, Network Device & COTS
•Application Build Review
•Firewall Rule base Audit
•Client Security Testing (kiosks, workstations, laptops, mobile devices)
•Wardialling
•Information security Reviews
•VPN / RAS Architecture Review
Security Awareness Workshops
•Secure Coding Workshop
•Social Engineering Workshop
•PCI DSS Workshops
•Information security workshops
Physical Security, Brand Attack & Privacy Services
•Telephone Based Social Engineering
•Physical Social Engineering
•Building Access Security Audits
•Facilities Management System Reviews
•CCTV Control Reviews
•Open Source Research
•Client Side attacks
•Personal Information Security Protection
•Targeted Trojan / Malware Analysis
•Corporate Resistance to Targeted Attack
•Corporate Public Profile
Computer Forensics and Incident Response
•Forensics Analysis
•Information Security Incident Management
•Secure Data Recovery & File Password Cracking
Compliance, Risk and Audit
•PCI ASV Testing
•PCI QSA Audits and Consultancy
•ISO27001 Implementation
•GSX CoCo testing
•Risk Management
•Business Impact Analysis
•Third Party Risk Assessments
•Business Continuity Management
•IS&T Operational Health Checks
•Best Practice Advice
Ongoing Automated Vulnerability Assessment
•External and internal network scanning
•PCI ASV compliant
•Ad hoc or preprogrammed regular scans
•Highly granular scanning runs