Comprehensive Cybersecurity Tests

We go beyond typical pen tests to assess the security of your endpoints along with any security products you are using. Our tests give you an accurate indication of what would happen if you were hit by a cyber attack today.

Results on Video

When we say visibility, we mean it literally. We can show you a video demonstrating exactly what happens during the test so you don’t have to assume anything.

Comprehensive Reporting &

Expert Guidance

We share a concise, easily understood report that gives you a birds eye view of the results. We deal with the complexity so you can get the information that matters most in a convenient format.

Tests conducted in a typical evaluation

https___blogs-images.forbes.com_thomasbrewster_files_2017_06_Petya-ransomware-Symantec.jpg

Tests vs Ransomware
We conduct tests with well known, pre-analysed, real world ransomware as well as new and recently discovered threats. These tests are designed to detect encryption or other activity that could lead to data loss. We also explore lateral movement and susceptibility to such threats spreading over the network.

Tests vs Malware
These tests are conducted with raw data of over a thousand potential malware samples collected recently. This is usually the best at providing a baseline for detection. Since the malware isn’t pre-analysed at this stage, we also conduct a forensic analysis of the system afterwards to explore persistence, C&C communication, data exfiltration and other potential damages.

Simulated Scenarios
We often experiment with our testing to explore specific conditions. For example, we can run tests offline, or with a time lag to simulate zero-day attack scenarios. We can also test in specific configurations to evaluation how a specific aspect of the defence functions. This includes off sec methods and techniques similar to penetration tests.

False Positives
We understand that detection accuracy and usability is a key part of any security approach, and false positives can hurt you more than you think. Where necessary, we include tests with legitimate applications to check for false flags, over aggressive scanners and rules that could have a negative impact. Security is a balancing act and we help you stay on the line.

Schedule a Test

Getting started is easy and we usually deliver results in a week. , You can book directly or by getting in touch.

Share VM image or Agent

You can share your desired test configuration through your EDR agent installer or a VM image of your Endpoint systems

Discuss Results

Receive a test report + video and discuss the results in a meeting with us. We will give you general recommendations.

Take action

Sometimes it is as simple as modifying your configuration, sometimes more. Either way we are happy to assist.

Knowledge is power

What would happen if you were hit by ransomware today? Find out now.

Capture.png
ESET 2.png
Capture (1).png

We keep an eye on major incidents, are often the first the come across new threats, and have the ability to conduct tests daily. We can also consult with you to evaluate your specific situation and help you choose the best security setup for your needs.

 

 Testing Method and Philosophy

Cybersecurity is constantly evolving and so are we. As a result we do not commit to a particular test methodology and rather focus on gathering the most useful information. All our tests are on video for the world to watch and interpret as they like. We focus on understanding and evaluating the underlying technology behind programs, so as to give our viewers transparency into what is actually between them and cyber armageddon.

At the end of the day any classifier technology including security software is ruled by the confusion matrix, and we keep up with the best in class academic and industry research to make sure that our tests are well placed.

It is also important to understand that our tests are not designed as a pass-fail metric. Our main objective is to inform and improve and make cyberspace safer for everyone.