We can provide a fully bespoke service tailored to your specific needs. We use a fully documented methodology that conforms to Industry Best Practice, and the lessons we have learned from multiple engagements successfully conducted over the last 10 years in both the public and private sector.

Our Method consists of the following four phases:

  • Scoping Meeting – The aim of this phase is to fully determine and confirm the client’s exact requirement for the engagement. A specific Test Plan will be produced for client approval.
  • Assessment Phase. The Conduct of the Vulnerability Assessment or Penetration Test, according to the agreed Test Plan.
  • Debrief and Report Production. On conclusion of the assessment a verbal debrief will be given prior to the final report being produced.
  • Final Report Presentation. A full and comprehensive report will be presented to the client. We will be available to answer any questions on the engagement or clarify the findings within the report.

Assessments can incorporate:

  • External Gateways / Web Portals.
  • End Points and Users.
  • Internal Network.
  • Host Assessment.
  • Application Assessment.
  • Information Layer Assessment.
  • User Vulnerability Assessment.
  • Others as identified during the scoping activity.