Vulnerability Assessment and PEN testing

Conducted by EC-Council certified CEH professionals, we undertake a software vulnerability assessment, audit, surveys, and interviews to assess your software licencing stance, OS patch status, hardware fit for purpose, hardware and software policies, processes and threats and the effectiveness of existing protection systems.

Our Cyber Security review service has 3 Phases:

1. Assessment
2. Remediation
3. Continuous Monitoring and Improvement

Our Cyber Security review service has 3 Phases:

1. Assessment
2. Remediation
3. Continuous Monitoring and Improvement
Phase 1 – Assessment typically takes 4-6 weeks and consist of the following activity:
  • Carry out a Black Box penetration test of multiple IPs / web applications of the client’s environment.
  • Carry out a Security Maturity Assessment involving conducting an online questionnaire, consultant assessment and feedback which is aligned with industry good practice.
  • Perform an Attack Simulation Exercise which will involve conducting a technical assessment and executive report which summarises the current strength of the key controls that should be helping you to defend against common security attacks e.g., Ransomware.
  • Prepare an IT Security Audit Report listing the findings from our penetration tests that will be categorised in terms of criticality and priority.
  • Prepare a Security Maturity Report which will summarise your current state of security maturity and provide a clear roadmap of prioritised improvements covering People, Process and Technology.
Phase 1 – Assessment typically takes 4-6 weeks and consist of the following activity:
  • Carry out a Black Box penetration test of multiple IPs / web applications of the client’s environment.
  • Carry out a Security Maturity Assessment involving conducting an online questionnaire, consultant assessment and feedback which is aligned with industry good practice.
  • Perform an Attack Simulation Exercise which will involve conducting a technical assessment and executive report which summarises the current strength of the key controls that should be helping you to defend against common security attacks e.g., Ransomware.
  • Prepare an IT Security Audit Report listing the findings from our penetration tests that will be categorised in terms of criticality and priority.
  • Prepare a Security Maturity Report which will summarise your current state of security maturity and provide a clear roadmap of prioritised improvements covering People, Process and Technology.

We then, following NIST cyber security frameworks, engage with you on
phase 2 – Remediation and phase 3 – Continuous Monitoring and Improvement.

To learn more about our Vulnerability Assessment and PEN testing services
call +44 (0)208 017 0007 or e-mail us.

Want to learn more?

Get in touch with us today
DSI logo
strapline