To help customer assess the web based application security using black box approach. Common web application security would be assess in order to let customer understand the issues and provide recommendation to fix their applications.
We develop a test plan tailored to meet the needs of customers for the execution of non-intrusive security assessments. Full documented procedures of testing, findings, results and recommendation will be provided to customers.
We develop a test plan tailored to meet the needs of customers for the execution of intrusive penetration test. Full documented procedures of testing, findings, results and recommendation will be provided to customers.
We will develop a test plan tailored to meet the needs of customers for the WLAN security assessments. Rogue and Evil Twins access point can be identified and located. Security settings in wireless will be evaluated.
Provide forensic imaging, data recovery & analysis and investigation services. Investigation scope covers disk, network, internet, email etc to identify the source of problems and provide recommendation for further analysis and remediation.
We provide information security training services such as IT Security Awareness, Ethical Hacking, Computer Forensic, CISA, CISSP, CEH, CHFI, CIFI and customized training content to fit customers requirement.