We designed our services for startups and SMEs and wanted to streamline the process of hiring penetration testers. With our pricing list, you know exactly how much a test will cost. As we charge by project and not by day, you don’t need to worry about us over charging and over scoping.
If you’re a company looking to make sure you’re secure and you mostly use off the shelf software to run your business, you may be more interested in an infrastructure test. If you’re writing custom applications, an application test is right for you.
Penetration testing can come in different “flavours” – white box, grey box and black box. This describes how much knowledge we’re given during the assessment or even before the assessment begins. This may sound confusing but our expert consultants will help you decide which is best for you.
In a white box test, we’ll attack the web application with full source code access or root access to the infrastructure. This lets us find more issues in less time. This can be useful if this is your first penetration test.
In a grey box test we use information about the environment, technologies and design to help focus our attacks. This allows us to use your expert knowledge of the application to direct the areas of testing.
In a black box test we perform attacks based on no knowledge of the application or network. This could mean testing takes longer but will give you an idea of what can be discovered by external attackers.
Yes! The experience that comes from finding hundreds of vulnerabilities in all environments shows we have a knack for testing all kinds of applications. Our consultants were some of the first to find vulnerabilities in Virtual Reality applications and in Android Wear.
We have a team of dedicated and experienced security professionals with backgrounds in development, privacy and regulation. Our consultants have run successful security assessments and pen tests for organisations of all sizes, from major banks to small startups. Because security really is our passion, we have presented our research and workshops at a number of conferences.
We wish the answer was “yes” but even data stored in the cloud can be vulnerable. We can help you assess your data processes to get peace of mind that your data is secure and help to fix any misconfigurations that may allow an attacker to perform sensitive operations.