Vulnerability Scanning


Vulnerability scanning is the systematic identification, analysis and reporting of technical security vulnerabilities that unauthorized parties and individuals may use to exploit and threaten the confidentiality, integrity and availability of business and technical data and information. External vulnerability scanning specifically examines an organization’s security profile from the perspective of an outsider or someone who does not have access to systems and networks behind the organization’s external security perimeter. Your external IPs be scanned once a year, once a quarter or monthly.

Read More

Mobile Application Scanning


Mobile platforms by default make certain promises about their environment. Development teams should not rely on these promises to protect critical data and code. Architecture review and threat modeling process will includes assessing and documenting security risks in the context of use cases, services, roles and functions unique to your application. The threat modeling is performed in collaboration with your business, engineering, operations and corporate security teams to understand and create the system’s security objectives, threat profile, attacks, vulnerabilities and countermeasures from design to deployment.

Read More

Darkweb Credential Monitoring


We provide the best approach to eliminate the biggest cause of massive data breaches, the weak and/or stolen password. We continuously monitor the dark web for stolen databases and identities, and maintains the encrypted data in our proprietary database. When integrated with an IAM solution, we can provide superior visibility into user-centric risk and the ability to automate appropriate corrective actions, preventing the abuse of compromised credentials.

Read More
Risk Assessment Wireless Risk Assessment

Wireless Risk Assessment

Wireless security has become both an internal and external problem. Companies are implementing wireless infrastructures internally but do not properly secure them. Employees can setup wireless access to the internal corporate infrastructure to bypass security controls or access the network from insecure wireless networks on the road or at home. This poses an entry point into the network that can be hard to control, monitor and audit.


We can provide a Wireless risk assessment that looks at the infrastructure you have setup, policies and procedures in place, test the implementation for vulnerabilities and provide guidance on securing future wireless architectures against emerging threats.

Key aspects of the wireless assessment include:

  • Scalability and features of current systems
  • Authentication & Encryption controls in use
  • Detect rogue wireless AP’s
  • Penetration testing of the wireless setup
  • Review encryption measures being used for wireless communications
  • Review the wireless access of handheld devices that connect to the corporate network
  • Test the wireless network for the ability to withstand a Denial of Service attack
  • Test the infrastructure to gain unauthorized access to networks and systems
  • Review network diagrams of wireless networks and protocols
  • Review policies and procedures pertaining around wireless networking
  • Provide a gap analysis of those policies and procedures against best practices

How the Process Works

Our staff will be on-site to review policies and procedure and interview your IT staff. We will conduct automated and manual testing from internal and external perspectives. Once testing is completed, we provide a detailed technical report on the findings and recommended solutions. You may choose to have us do a retest using only automated techniques after you have completed the recommended fixes.

For more information Contact Us.