Technical Vulnerability Assessment

Fingerprint Icon

Understand your organisation's technical vulnerabilities.

Fingerprint Icon

Build Review

This service makes use of automated tools and manual inspection, and requires a high level of understanding of the client’s intended use of the system.

The exact process depends on the system or component being assessed, the environment in which it is to operate, and the organisation’s appetite for technical risk.

Learn More
Fingerprint Icon

Firewall Rule Audit

This service makes use of automated tools and manual inspection, and requires a high level of understanding of the client’s business model and typical Internet use.

The exact process depends on the network and device being assessed, the environment in which it is to operate, and the types of network activity generally permitted.

Learn More
Fingerprint Icon

ICS/OT Security Review

This assessment seeks to identify the maturity of any technical risk management processes applied to ICS or OT infrastructure, through a combination of policy and procedure review, interviews with appropriate personnel, targeted inspection of equipment, and both passive and active analysis of network connections. The specific activities performed will vary depending on the environment and the risk profile, however, they typically involve assessment of the following: Access control and privilege management.

Learn More