Assess your cyber security
Discover and test your attack surfaces, whether online or internal
Microsoft 365 Security Audit
We have custom tools to perform security tests and audit of all parts of a Microsoft 365 tenant, including key areas such as MFA, application and guest access, and audit logs.
Google Workspace Security Audit
We conduct detailed security audits of Google Workspace tenants, to help customers tighten the controls over key services such as Gmail and Google Drive.
Online Risk Assessment
Using our own attack surface mapping tool, we can walk you through your online assets and any vulnerabilities or issues they may have.
Network Security Survey
We perform surveys of internal networks, to discover assets and vulnerabilities that an attacker inside your network could exploit.
Cloud Infrastructure Test
We offer holistic and focused cloud security reviews. We use GCP and IONOS ourselves for our own and our customers' solutions, but are also experienced in both AWS and Azure.
Endpoint Security Test
Whether Windows, macOS or mobile devices, we can complete technical testing on user devices, to properly evaluate the installed protections and defences against common threats.
Web and Mobile Application Tests
After agreeing the scope and coverage with a customer, we combine our development and security expertise to test everything an attacker would.
Hardware Security Audit
With a background in hardware development and forensics, some of our staff specialise in hardware security. Whether consumer or industrial, we can test what an attacker could achieve if they get their hands on your devices.
Improve your cyber resilience
Security is never finished, and we can help you improve to the next level. We're more than just a testing shop, we can fix issues for you, and even build the next version.
Microsoft 365 Configuration and Monitoring
If you don’t have time to implement a report full of recommendations, we can work with you to improve the security of your Microsoft 365 tenant. We can deploy bespoke monitoring tools to help you keep on top of your tenant.
If you’re not sure where you are with different elements of cyber security, we can craft a scope to consider as many elements as you need.
Respond to potential incidents
You cannot prevent every attack, but we can help you in the event of any incident, with digital forensics, internal and technical investigations.
Whether it’s a compromised server or a stolen email account, we can help get to the bottom of what happened and how. Most importantly, we can help you make sure it won’t happen again.
We can deploy our custom monitored VPN to any device, to allow us to monitor its network traffic for signs of compromise.
We specialise in digital forensics of mobile devices, including malware or compromise investigation. We partner with an industry-leading forensic acquisition capability, and use a combination of standard and bespoke tools for inspecting extracted data.