Expertise image

Services

Penetration Testing and Vulnerability Assessments

Every organisation that relies on the security and integrity of its IT systems benefits from ongoing vulnerability assessments instead of one-off penetration tests. The main issue with the traditional penetration test is that it’s simply a snapshot in time. And in our opinion, this approach doesn’t offer a great deal of assurance because server, website and software vulnerabilities and exploits are found far more frequently than the usual pen test cycle.

Our work isn’t a destination, it’s more of a journey. Ongoing testing means we can deliver continuous assurance that your network’s perimeter is secure, at a price that compares well to less effective one-off testing.

020 7193 3324

Continuous Perimeter Assurance

Using the Intruder service, we find your weaknesses before the hackers do. Intruder offers continuous perimeter assurance that helps identify and resolve your vulnerabilities.

ALWAYS ON

Because your systems are always changing, Intruder performs frequent baseline assessments of your digital assets to identify new weaknesses.

HYBRID APPROACH

Expert penetration testers reduce false positives and investigate potential issues, while the clever use of automation makes regular assessments possible.

EMERGING THREAT NOTIFICATIONS

Intruder issues notifications for newly released vulnerabilities so you can protect your systems in good time

EASY TO UNDERSTAND

Intruder is simple to use, and we explain everything in clear, concise language.

The Monthly Baseline

Reports screenshots

CONFIGURATION WEAKNESSES

We check that no equipment or services have been configured in a way which reduces their security, such as default credentials, or weak encryption.

MISSING PATCHES

Where software versions can be identified or fingerprinted, we check whether security patching is current.

APPLICATION BUGS

Where custom made applications exist, we check that there are no application- layer weaknesses such as SQL Injection, or Cross-Site Scripting.

Emerging Threat Notifications

intruder dashboard

Intruder checks for new vulnerabilities daily, triaging them to identify the most critical issues.

When a vulnerability is critical, Intruder performs an ad-hoc assessment to detect whether your systems are vulnerable to the specific issue.

If your systems are affected, Intruder sends notifications via an email or text message to a specified phone, or via the Intruder mobile app.

Competitive Landscape

Package options

  • Baseline

    • For security-conscious startups, or large enterprises starting vulnerability management for the first time.
    • £45 per system / month
    • Get a hacker’s eye-view of your network
    • Monthly full vulnerability assessment
    • Meaningful reports
    • Email updates

  • Pro

    • For startups with banking clients, or large enterprises that have sophisticated requirements.
    • Priced on quotation
    • All Standard features plus…
    • Daily alerting where emerging vulnerabilities affect your systems
    • Potential issues investigated by expert penetration testers
    • Expert false positive reduction
    • Flexible assessment schedules
    • Bolt-on assessments

Top 10 IT forensic dos

Tip 5 . Do not inform anyone other than necessary that an investigation is underway

What our clients say