Infrastructure Assessment

Commonly referred to as a ‘penetration test’ or ‘pen-test’ our infrastructure assessments provide the next level of assurance from a more basic review by not only identifying your weaker areas.

In Ancient Greece, the revered scribe Callimachus gave inspiration to the phrase ‘to catch a thief’. We’re fairly sure he wasn’t referring to cybercrime, but the premise remains the same – to catch (or foil) a thief, it becomes necessary to think like one. This is where our analysts have the edge - an advanced understanding of the ‘dark arts’ of technology and communications and the highest possible calibre of ethical standards places them on the leading edge of their field.

Commonly referred to as a ‘penetration test’ or ‘pen-test’ our infrastructure assessments provide the next level of assurance from a more basic review by not only identifying your weaker areas, but attempting to actively exploit them in order to gain access and privilege escalations across your digital estate. We don’t limit this to the servers on your network, attackers will look at your web site and apps, VoIP systems, laptops & BYOD devices, so we do too.

These are intrusive tests and we understand that you will have concerns regarding the impact this may have. We work closely with your management and IT personnel to ensure a bespoke testing regime designed to minimise disruption while maximising results of quantifiable value. As with all our services, we provide you with a highly-granular report that delivers immediate and measured impact to your security posture.