trust stream penetration testing 1.12

3
Penetration Testing & Security Assessment Penetration testing is an essential process that identifies potential security threats and vulnerabilities that pose a risk to your business at both hardware and software level. Testing your security is an essential exercise for responsible businesses. Are you aware of your security weaknesses? Would you like to address your security issues before someone exploits them? How would a malicious attack affect your business? Costs are high whenever data is stolen or corrupted or systems are made unavailable – What steps have you taken to reduce the risk of a successful attacks? Our security assessments and penetration testing will highlight vulnerabilities and provide you with information to help you limit the risk of unauthorised access to sensitive information. Our security consultants have extensive experience of testing and securing applications and infrastructure. Our knowledge and the application of our experience ensures your business operates with the minimum of risk of a successful unauthorised attack. We test your systems from a targeted and enterprise- wide perspective to cover all potential attack vectors, taking into account the risks posed by cumulative minor risks or vulnerabilities Penetration Testing Services from Truststream SECURITY ASSESSMENT INFRASTRUCTURE PENETRATION TESTING MOBILE APPLICATION PENETRATION TESTING WEB APPLICATION PENETRATION TESTING WIRELESS SECURITY ASSESSNENTS CESG (CHECK) – CERTIFIED PROFESSIONAL SERVICE PCI-DSS COMPLIANCE TESTS

Upload: shaun-thomas

Post on 04-Aug-2015

37 views

Category:

Business


1 download

TRANSCRIPT

Page 1: Trust stream penetration testing 1.12

Penetration Testing & Security Assessment Penetration testing is an essential process that identifies potential security threats and vulnerabilities that pose a risk to your business at both hardware and software level.

Testing your security is an essential exercise for responsible businesses. Are you aware of your security weaknesses? Would you like to address your security issues before someone exploits them? How would a malicious attack affect your business?

Costs are high whenever data is stolen or corrupted or systems are made unavailable – What steps have you taken to reduce the risk of a successful attacks?

Our security assessments and penetration testing will highlight vulnerabilities and provide you with information to help you limit the risk of unauthorised access to sensitive information.

Our security consultants have extensive experience of testing and securing applications and infrastructure. Our knowledge and the application of our experience ensures your business operates with the minimum of risk of a successful unauthorised attack.

We test your systems from a targeted and enterprise-wide perspective to cover all potential attack vectors, taking into account the risks posed by cumulative minor risks or vulnerabilities

Penetration Testing Services from Truststream

SECURITY ASSESSMENT

INFRASTRUCTURE PENETRATION TESTING

MOBILE APPLICATION PENETRATION TESTING

WEB APPLICATION PENETRATION TESTING

WIRELESS SECURITY ASSESSNENTS

CESG (CHECK) – CERTIFIED PROFESSIONAL SERVICE

PCI-DSS COMPLIANCE TESTS

Page 2: Trust stream penetration testing 1.12

INFRASTRUCTURE TESTING

We assess the state of your infrastructure security and the effectiveness of the controls you have in place. We use a range of attack methods to identify weaknesses that would lead to an unauthorised access if your systems were the subject of a focused attack. We report detailed findings and recommend the best course of action to mitigate or remove the risks.

WEB APPLICATION TESTING

Our creative test plans will assess the validity of your software security and produce actionable reports from which we base our recommendations. We use the same penetration techniques you would expect in a real-world attack scenario and recognised testing methodology to ensure your software meets the highest standards.

MOBILE APPLICATION TESTING

We assess the security controls of application installations on mobile devices and highlight how the application introduces risks by exposing web service calls. Our tests are available ‘pre’ and ‘post’ release and follow recognised testing methodologies. Our certified testing team will ensure your application operates with the minimum of risk to your business systems and its users.

WIRELESS TESTING

We approach your wireless security as an unauthorised intruder would. Our experienced testers will highlight vulnerabilities and weak security controls that could allow rogue devices to access your network. We will analyse your security configurations and show you how to implement policies that will shore up your defences.

Engage Assess Collaborate Improve

We learn about your business to identify

risk areas and potential security

concerns.

We evaluate your security and its effectiveness against known cyber threats before

they can harm your business.

We work with your business and its staff to mitigate risk and create

a secure working environment.

We develop security controls to limit risk to

data and applications in a secure, compliant IT

system.

Page 3: Trust stream penetration testing 1.12

PHONE: +44 (0131) 473-2354

FAX: +44 (0131) 473-2309

E-MAIL: [email protected]

Truststream are a team of very experienced security professionals. Our consultants have many years of experience testing highly secure environments for some of the UK’s most respected institutions.

Our Customers Receive:

1. Threat Assessments 2. Security Weakness Identification 3. A Plan of Action for a Secure Environment Moving Forward 4. Staff Education to Instil Secure Working Practises 5. Regulatory compliance

We provide an essential service and are proud of the reputation we have developed among our customers.

Assured Standards Our testers are Crest and Check accredited. We actively pursue the best industry seals of approval to give you added peace of mind.

Your Next Step We are happy to discuss you exact requirements and offer advice on the correct approach to securing your IT infrastructure and applications.

Contact us today to initiate a no-obligation conversation and learn how we can help you protect your business.

HUDSON HOUSE

8 ALBANY STREET

EDINBURGH

EH1 3QB