We believe that every organisation which relies on the security and integrity of the systems benefit from ongoing vulnerability assessment rather than one-off penetration tests. The main issue with the traditional penetration test is that they are simply snapshots in time. In our opinion, this approach doesn’t offer a great deal of assurance as server/website/software vulnerabilities and exploits are found on a far more frequent basis than companies carry out such tests.
Forensic Control provides continuous assurance that your network’s perimeter is secure at a price comparable to one-off tests.
Because your systems are always changing, Intruder performs frequent baseline assessments of your digital assets, to identify newly introduced weaknesses.
Expert penetration testers reduce false positives and investigate potential issues, while clever use of automation makes regular assessments possible.
EMERGING THREAT NOTIFICATIONS
Intruder issues notifications for newly released vulnerabilities that could be used to breach your systems.
EASY TO UNDERSTAND
Intruder is simple to use, and we explain issues and remediation advice in clear and concise language.
We check that no equipment or services have been configured in a way which reduces their security, such as default credentials, or weak encryption.
Where software versions can be identified or fingerprinted, we check that the so ware is not missing any security patches which could leave it exposed.
Where custom made applications exist, we check that there are no application- layer weaknesses such as SQL Injection, or Cross-Site Scripting.
Intruder performs a daily check of new vulnerabilities released, triaging each of them for the most critical issues.
Where a vulnerability is determined to be critical, Intruder will perform an ad-hoc assessment, to detect whether your systems are vulnerable to that specific issue.
If your systems are affected, the results are added to the portal. Intruder also sends notifications via an email, text message to a specified phone, or via the Intruder mobile app.
“Forensic Control provided us with invaluable help in dealing with a complex investigation relating to a contested breach of contract matter. The response to our request for independent expert advice was professional, discrete and swift: our needs and the highly sensitive situation we faced were quickly grasped and, most importantly, the report on the IT data analysis was provided in an accessible, readily understood format. A superb service.”
“We have used a number of services from Forensics Control with excellent results and in a timely manner. We found Jonathan and his team to be professional and creative utilizing leading edge technology and subject matter expertise to achieve the desired outcome.”
“We are completely indebted to Forensic Control. Following what could have been a real business disaster when both our server and back up disk became corrupted we potentially faced losing all our client files. Jonathan calmly and efficiently got us back up and running within 24 hours. We can wholeheartedly recommend Forensic Control for their true professionalism and in our case, calmness in a storm!”
“Forensic Control assisted us with the investigation into a civil case that consisted of highly intricate and concealed IT issues. They produced two expert reports that were very well presented and dealt with the issues in a clear and succinct manner.”