Security Risk

Security Risk

Our security Risk services range includes:

Architecture Security Review

ProCheckUp consultants will conduct a detailed review of the organisations network security goals and requirements as well as evaluating any associated security technology policies. Read more...

STAR (Simulated Target Attack and Response) is a new, intelligence-led, vulnerability testing framework devised to replicate the behaviours of a real-world threat against individual clients. Read more...

Today’s data protection regulations (GDPR) and standards (PCI-DSS) places organisations under increased pressure to demonstrate how they safeguard personally identifiable information and sensitive data. Read more...

External Internet discovery consultancy determines the external presence of your organisation, and whether there are any applications or services which are unknown to the organisation. Read more...

Internal network discovery consultancy determines the internal presence of your organisation, and whether there are any applications or services which are unknown to the organisation. Read more...

Mergers and Acquisitions

Any Merger or Acquisition (M&A)  scenario that involves integrating networks or services, with a previously unvetted organization or partner should be subject to extensive security audit first. Read more...

The outsourced Chief Information Security Officer (CISO) provides information security leadership from an appropriate pool of expertise and technical resources from within ProCheckUp. Read more...

Open Source Intelligence Gathering

ProCheckUp uses OSINT and online tools, to determine the organisations externally exposed networks/IP ranges. domain names and sub domain names in use.Read more...

Physical security of Information is often an area that is overlooked with the concentration usually placed on technical controls yet safeguarding the physical environment can have a huge impact on the overall information security of an organisation. Read more...

Network segmentation of, or isolating (segmenting), the cardholder data environment from the remainder of an entity’s network is not a PCI DSS requirement. Read more...

The outsourced Chief Information Security Officer (CISO) provides information security leadership from an appropriate pool of expertise and technical resources from within ProCheckUp. Read more...


ACCREDITATIONS