Accessability Links

Cyber Security Testing

Security testing provides an assessment of the security posture of a computer network.

At Capita, we can provide a full range of security testing services to reduce risk, identify vulnerabilities and impersonate hackers to ensure your systems are compliant and secure.

Services we provide include:

• Vulnerability Assessment: A blended vulnerability assessment using a combination of both automated tools and manual testing techniques to evaluate the security of your IT systems

• Network Penetration Testing: Following a set methodology using manual techniques to identify and exploit discovered weaknesses

• Web Application Penetration Testing: following a set methodology and manual techniques to identify and exploit discovered weaknesses

• Firewall Security Assessment: assessing the boundary defences of an organisation

• Server Build Review: gives a comprehensive view of the servers’ security status, this is mainly on host auditing with authenticated scanning

• Client Security Evaluation: give a comprehensive view of what is possible from a user’s point of view, this is mainly testing for privilege escalation

• Mobile Application Penetration Testing: following a set methodology and manual techniques to identify and exploit discovered weaknesses

• Network Device Configuration Review: assess the security posture of routers and switches

• Wireless Network Assessment: ascertain if appropriate security measures have been implemented to ensure only authorised personnel can connect

• Sources Code Security Review: A detailed security review of an application’s source code following a set methodology and using both automated and manual analysis techniques

• PCI ASV Scanning: using a combination of both automated tools and manual testing techniques to evaluate the security of your Cardholder Data Environment

• Red Team Assessment: Providing an invaluable service identifying security vulnerabilities in customers’ overall security

• Phishing Campaign: email and telephone based, to identify staff open security awareness

For more information or to discuss any of your security needs, please click here [LINK].
Back to Top