Our consultancy / posture review service
Information security can be difficult, there are many areas to consider, a constantly evolving threat landscape, countless potential attack vectors to protect against and a host of potential security ‘solutions’ on offer. With so much to think about, it’s no wonder many organisations are unsure on which way to turn, or what the most effective route is to take.
This is especially the case for companies who may have never considered information security before or who have been required to act due to new legislation or regulatory compliance.
Our information security consultancy service is designed to identify and prioritise solutions that will deliver immediate, cost efficient security benefits to your organisation in a stepped approach.
Find out more about Pentest
Find out more about Pentest, the support we offer and
the reasons clients choose us.
Our consultancy process
Our consultancy service is tailored to your requirements, ensuring you get the best possible outcome for your business. Below we outline the key stages our consultancy service goes through:
1. Security questionnaire
Our security questionnaire allows us to gain an understanding of your corporate networks, the security measures you have in place and the security knowledge that is held within your organisation. This forms the basis from which we can start to investigate your security posture further.
2. Initial investigation
An initial investigation will be utilised to gain an understanding of your security needs & concerns, and to go through the security questionnaire in more detail. This will allow us to uncover any initial vulnerabilities, as well as identify key areas of concern for further investigation.
3. In-depth investigation
Once we understand the key areas of concern, we will conduct an in-depth investigation with your team. This will allow us to go into more detail, understanding more about the specific security measures and policies in place around your key services.
A comprehensive report will be delivered, this will contain a breakdown of the areas discussed during the consultation, outline the key risks uncovered and provide a detailed roadmap of information security improvement works we recommend.
5. Post-engagement support
Our job doesn't finish on the delivery of a report. Our consultants will be available after the report has been delivered to offer their expert guidance & to support your security improvement efforts.
6. Further testing requirements
Once the initial roadmap has been completed, we can work with you to understand any potential future information security requirements and help prioritise your next steps.
Why choose Pentest?
Our test process isn’t the only reason clients choose to work with us. Find out more about Pentest, our ethos and the support we offer our clients.
Want to find out more about our information security consultancy service? Our team are on hand to provide you with the information you need. Please fill out the form below and one of our team will be in touch shortly.