IT Penetration testing is the process of attempting to gain access to computer systems, networks or web applications without knowledge of usernames, passwords or any other normal means of access.   This process identifies vulnerabilities that a potential hacker could exploit.

World Class Expertise

Our team of Penetration Testers work under the terms of CHECK as defined by CESG.  They each possess security clearance (SC or DV) and have extensive Commercial and Public sector experience.

They have delivered high profile and sensitive projects on behalf of clients such as the Metropolitan Police, UK Government, Patient Records & UK Legal System.


Comprehensive Service Offering

We provide a comprehensive range of Penetration Testing services, which  conducted on a regular basis, will help support your defence against future attacks.

Each test we conduct is followed up with a report, which details the findings and full remediation recommendations.

External Penetration Testing

To ensure that your Company’s IT systems are secure from any internet based attack, we can carry out any of the following tests:

  • External network testing
  • Remote access review
  • Website testing
  • Web Application testing
  • Mobile Application testing
  • Source Code review


Internal Penetration Testing

The following assessments reveal any potential issues that may allow a server to be compromised by a user already on the internal network.

  • Internal Infrastructure testing
  • Workstation Reviews
  • Laptops & Desktops
  • Server Review
  • Wireless Vulnerability Assessment
  • VOIP
  • Mobile Device testing

Social Engineering

Social Engineering, in the context of cyber security, refers to the psychological manipulation of people into performing actions or divulging confidential information.  It’s a complex confidence trick for the purpose of information gathering, fraud, or system access.

The associated risks can often be a larger security threat than networks and IT.

The following tests can be conducted insolation, or as a wider Physical Security Audit:

  • Remote Social Engineering
  • Perimeter & Internal Security Review
  • Physical Building Access
  • Obtaining employment in or access to the server room


Contact us Today for a confidential discussion about your requirements