Penetration (or Pen) Testing is the primary method for seeking reassurance that a hacker cannot use their skills to obtain your valuable data.
Pen Testing uses automated tools and manual testing in an attempt to exploit vulnerabilities to determine whether malicious activity is possible via weaknesses in the system. Pen Testing is designed to achieve a specific goal and is generally requested by customers who have already reached a desired security posture and wish to discover if the defences in place are sufficient.
We provide three main services.
- Automated penetration testing using an appropriate selection of tools.
- Human interactive testing
- Social Engineering to test staff’s ability to resist phishing tests
As a Tenable Silver Partner we are able to provide continuous, affordable security monitoring to ensure that any changes made to your estate do not negatively affect your security stance.
Whether an organisation is planning to achieve Cyber Essentials or not, regular internal security scanning can help to massively reduce attack vectors and detect new threats brought about by planned or unplanned change.
Vulnerability Assessment (VA) uses a variety of automated tools to discover vulnerabilities that are present on a system; it is used to alert clients to existing concerns in the infrastructure or web applications and where they are located. A VA is generally designed for clients who are aware that their security posture is not yet solidified and that they need help in identifying and prioritising weaknesses in order to direct effort most efficiently.
Rather than a one off, point-in-time scan, we provide monthly reports detailing how an environment has changed or highlight new threats that have been identified.
We have teamed up with Tenable and are proud to be an official Silver Partner.