The Pentest People Offering
Pentest People are a UK-based cybersecurity consultancy focusing on bringing the benefits of Penetration Testing as a Service (PTaaS) to all its clients.
This innovative approach to website, application and infrastructure security testing combines the benefits of a consultant-led penetration test and vulnerability assurance, through a technologically advanced SecurePortal. Our Penetration testing services provide a live system to our clients through the life of a contract rather than just a single point in time.
We have an array of Penetration Testing Services to suit all businesses
Assess and measure your cyber security through Infrastructure Penetration Testing to allow you to manage the identified issues.
Assess your critical Web Applications for Security Vulnerabilities with our Web Application Penetration Testing Service.
Research, develop and manage an assessment of the security of your people and processes utilising the latest techniques with our social engineering security services..
Assess the VPN security configuration of your network to ensure a misconfiguration or vulnerability is not allowing external access to your corporate network.
Assess your Firewall Rule Configuration looking for security issues and unnecessary rules that could lead to a breach of your network with a firewall penetration test.
Assess the critical network devices that make up your corporate network looking for software and configuration vulnerabilities.
Made the move to Cloud? Take a look at our Cloud specific services
This review audits your Azure and Office 365 instances to identify misconfigurations, lack of best practices and secure configurations from a ‘Blue Team’ perspective, allowing you to remediate any cloud security vulnerabilities before they are exploited.
The goal of this Microsoft cloud security assessment is to provide insight into the complications and consequences caused by weak security configurations, controls, and password usage.
This combines both the cloud security assessments to provide the most comprehensive assessment that covers both perspectives — the attacker and the administrator.