Wireless Penetration Testing
From finding rogue wireless access points, performing network segregation testing (Guest to Corporate) and security testing the security of wireless networks.
System Breakout Testing
Identifies methods that a user could circumvent measures put in place to deny or restrict access to particular applications and areas of the network on virtual environments such as Citrix.
Host Security Build Review
Technical security reviews are conducted on database software (such as Oracle, MS SQL Server) and operating systems (such as Windows, Linux) to identify weaknesses that could be exploited as well as assessing departure from best practice.
Security Architecture Assessment
The network will be assessed for it’s suitability to host and transmit the criticality of the data. This can be performed at design to implementation stages.