-

 

Our security audit services range includes

Architecture Security Review

ProCheckUp consultants will conduct a detailed review of the organisations network security goals and requirements as well as evaluating any associated security technology policies.

Application Testing

CREST STAR Assessments

STAR (Simulated Target Attack and Response) is a new, intelligence-led, vulnerability testing framework devised to replicate the behaviours of a real-world threat against individual clients.

Breakout Testing

Data Discovery

Today’s data protection regulations (GDPR) and standards (PCI-DSS) places organisations under increased pressure to demonstrate how they safeguard personally identifiable information and sensitive data.

NCSC

External Internet Discovery

External Internet discovery consultancy determines the external presence of your organisation, and whether there are any applications or services which are unknown to the organisation.

Cloud

Internal network discovery/mapping

Internal network discovery consultancy determines the internal presence of your organisation, and whether there are any applications or services which are unknown to the organisation.

Device Testing

Mergers and Acquisitions

Any Merger or Acquisition (M&A)  scenario that involves integrating networks or services, with a previously unvetted organization or partner should be subject to extensive security audit first.

Infrastructure

Onsite/Remote Security Manager

The outsourced Chief Information Security Officer (CISO) provides information security leadership from an appropriate pool of expertise and technical resources from within ProCheckUp.

Managed Scanning

Open Source Intelligence Gathering

ProCheckUp uses OSINT and online tools, to determine the organisations externally exposed networks/IP ranges. domain names and sub domain names in use.

Mobile Application

Physical Security Audit

Physical security of Information is often an area that is overlooked with the concentration usually placed on technical controls yet safeguarding the physical environment can have a huge impact on the overall information security of an organisation.

Red/Blue/Purple

Segmentation Testing

Network segmentation of, or isolating (segmenting), the cardholder data environment from the remainder of an entity’s network is not a PCI DSS requirement.

Social

Virtual CISO

The outsourced Chief Information Security Officer (CISO) provides information security leadership from an appropriate pool of expertise and technical resources from within ProCheckUp.

Vulnerabililty

Accreditations

Crest
ISO
Qualified Security Assessor
Approved Scanning Vendor
Check
Cyber Essentials