A vulnerability assessment is a low cost high value exercise which helps identify common vulnerabilities on your infrastructure. The goal of a vulnerability assessment is to deliver a prioritised list of risks to the organisation to allow for cost effective remediation.
Red Team Assessments
Our red team service is tailored towards replicating Advanced Persistent Threats (APTs) with the goal of helping you identify the effectiveness of controls, raise your security posture and improve your team’s responses and reactions in the event of a breach.
Remote Threat Simulation
Our remote threat simulation is a zero knowledge full spectrum attack against all externally facing assets from prolonged attacks mimicking slow but persistent threat actors. Remote threat simulation has designed with the goal of finding an ingress point onto your network and to identify what an attacker could achieve once they have gained persistence.
Internal Penetration Testing
Internal penetration tests are often goal based, with several ‘goals’ outlined before the commencement of the test. Goal based penetration testing will help you protect your most critical assets and sensitive information from internal threats. Internal penetration tests will allow you to evaluate the internal network and assess the negative impact an internal attack could have on your business.
External Penetration Testing
An external penetration test replicates an attack conducted against externally facing infrastructure from the perspective of an Internet borne attacker. External penetration testing enables you to evaluate external threats and identify how a breach could negatively affect your companies availability, profitability and reputation.
Web Application and Web Services Penetration Testing
Web application and web services penetration testing simulates real-world attacks to determine business risk and financial impact against your online web applications and web services. We provide you with detailed findings of any security flaws uncovered and documents the current security posture of the application, services and the hosting environment.
Mobile Application Penetration Testing
Mobile assessments consist of two parts; testing the security of the application and testing supporting web services. Testing both parts in conjunction offers greater coverage and enables our team to identify all security flaws within the in-scope application and supporting infrastructure.
Thick Client Application Penetration Testing
Thick client penetration testing ensures the security controls implemented in the thick client are robust so that sensitive information cannot be retrieved. Our comprehensive reports highlight any improvements which can be made to further secure the thick client through detailed remediation guidance.
Wireless Penetration Testing
Wireless penetration testing can be utilised to understand the resilience of your wireless controls, segmentation and access point configurations. Our wireless testing service is designed to give you an overall review of the current health of your wireless network.
Mainframe Penetration Testing
Our security consultants include some of the very few penetration testers in the industry who have performed penetration testing against mainframes. We have developed an extensive in-house toolkit to specifically test mainframes. Our mainframe testing not only ensures your mainframe is resilient, but also draws on our extensive knowledge to negate any negative impact giving you the best coverage on your most critical infrastructure.
Black Box Testing
Our black box testing is designed to test the resilience of your equipment in the event of theft or misplacement. Our team has worked with numerous clients testing the resilience of a multitude of different device types from mobile phones to laptops.
Social Engineering & Physical Assessments
Social engineering is the simulation of real world attackers attempting to compromise the integrity of many different aspects of your perimeter from the physical security of the building, WiFi networks, masquerading as employees, attacking the internal network and conducting targeted phishing and telephone campaigns.
Kontex Security Ltd
T: +353 (0) 62 43937
E: [email protected]
345 Park Ave # 1702, New York, NY 10154, USA
Maynooth Works, Maynooth University, Kildare, Ireland