Security Reviews
Design, Review and Response
Secure design, architecture and code reviews can be used to ensure networks, applications and systems suitably protect information and detect unauthorised access attempts. Again, utilising a technical resource with a penetration testing skill set within a project development lifecycle can bring significant benefits by addressing security threats during design and implementation, that would be costly to retrofit when identified later during a pre or post go live penetration test of a production environment.
Supplier Security Reviews
With the large increase in outsourcing, supplier security is an ever increasing concern. In some sectors regulatory pressure is forcing organisations to perform significant due diligence on their suppliers. By performing structured security reviews, using frameworks such as ISO 27001. Our reviews cover the bredth of information security, from physical to logical.