External Infrastructure

Make no mistake, hackers are interested in you and the external infrastructure represents a real and present danger. All businesses today require some form of connectivity to various external parties and consequently must expose certain resources publicly. Understanding your risks and the potential implications of a compromise through the perimeter is therefore fundamental.

For a long time, securing the perimeter was the focus of activity within the business. However, despite the attention that new technologies to trade have recently demanded, securing the external infrastructure remains crucial. Along with securing the internal infrastructure, it acts as the foundation of the business as it serves to protect the information assets and ensures compliance with a multitude of industry regulations and standards.

Having an extensive capability in External Infrastructure Assessment, our highly skilled consultants will analyse your external infrastructure to identify all the vulnerabilities and threats, which could result in a compromise. We will review configurations, identify access points and rogue devices, in addition to testing for vulnerabilities. We adopt comprehensive, standardized methodologies that combine automated scanning tools, customised proprietary scripts and manual techniques; and test for exploits that could allow unauthorised access.

We deliver:

  • A detailed report for your Executive, Management and Technical audiences
  • Identification of good practices found in the environment along with weaknesses
  • Prioritized results sorted by severity of risk
  • Vulnerabilities reported against CVSS2, the OWASP Top 10 and SANS Top 25
  • Recommendations on how to fix vulnerabilities and reduce your risks based on best practice, our experience and your unique business requirements
  • Guidance on ways to ensure compliance with regulations and industry mandates
  • Briefing session with your chosen team to guarantee understanding