0800 808 5270

Cyber & Penetration Testing

Cyber & Penetration Testing

Edge IT Group has partnered with Huntsman and IRM to provide Cyber and Penetration testing that covers Cyber posture definition and strategy, auditing tools, Security Analytics platform, advice & guidance around other security tool-sets and remediation services.

 

View our Partners

Cyber

The Edge IT Group Cyber proposition covers five key components that work to complement or develop a client’s existing Cyber capability.

The five components can be delivered in the order the client’s circumstances dictate.

The five components are:

  1. Consulting services to determine or ratifying the client’s current Cyber posture or strategy
  2. The deployment of an automated auditing tools to monitor performance over a range of ‘key security performance indicators.’
  3. The deployment of a ‘state of the art’ AI Security Analytics tools (aka SIM or SEIM)
  4. The provision of the most robust Penetration Testing services
  5. Consulting services to remediate issues with the Client current Cyber posture.

Penetration Testing

Edge IT Group provides the link between the client and the Pen-tester to provide clarity to the scope and frequency of Pen-tests. Edge IT Group will prime the engagement covering:

  • Scope of the engagement (Threat actors)
  • Management of the Pen-testing Analysts and delivery
  • Delivery of finding and recommendations
  • Fully accredited Penetration test; conducted by fully accredited consultants, including CREST (founding member), QSA, Cyber Essentials Plus, ISO 27001, IASME Gold, CHECK (over 20 years), with the following qualifications; CISSP, CISA, CISM, SANS-GIAC, and CEH
  • IRM is also an official Accreditation Body
  • Edge IT Group’s delivery partner IRM, who was recently acquired by Altran, the world largest Engineering R&D company, is considered to be a world-leading ‘tech-giant.’

The scope will be customer dependent based upon threat actor assessment, covering:-

  • Operating Systems
  • Databases
  • Internal & external networks Inc. Wi-Fi, routers, switches & firewalls
  • Services deployed in the Cloud
  • Virtual Private Networks (VPN) and remote access services
  • Telephony systems, inc VoIP
  • Session management, authentication and authorisation, including cookie tampering
  • Web input validation
  • Business logic vulnerabilities
  • Web server configuration
  • Cross-site scripting attack & SQL injection attacks
  • CWE/SANS top 25
  • OWASP top 10
  • Mobile application (IOS/Android)
  • Thick client applications
  • API’s & web services
  • Wireless services
  • Embedded systems
  • Firewall, PIS & IDS evasion
  • Social Media
  • Third-party apps
  • Cyber Option & Strategy definition
    • Audit & risk assessment
    • Risk management
    • Threat actors
    • Infrastructure architecture review
    • Security operations & software tool review
    • Incident response
    • 3rd party security providers contracts, tools & capabilities review
    • Cyber compliance audits

Book a Consultation

If you would like to find out how we could help transform your business, leave your name and phone number and we’ll contact you to discuss your requirements.

Book a Consultation