From Firewalls to email trying to get your head around IT Security can be daunting. That is where DCT Security come in to help. Our experienced team can audit your systems, train your team and test your networks. By spotting vulnerabilities and recommending important changes DCT Security keep your business safe, secure and on guard against potential attacks.
Your company network and applications can be exposed if you don't maintain your security perimeter.
DCT Security assess your network defences and highlight vulnerabilities, risks and treatments.
Duration: 2-3 days
Scan all available ports to confirm that the services advertised comply with firewall policy and rules.
Enumerate all available services on the external IP
Perform (un)authenticated vulnerability scans on public facing servers.
Provide clear findings and a prioritised list of actions, work efforts, and findings.
Duration: 5-7 days depending on scope
The stages listed outline the basic steps that form a penetration test. Each penetration test is different and requires careful planning and scoping.
This website uses cookies to improve your browsing experience. By continuing to use this site you agree to our use of cookies for analytics, We do not use Cookies to find out the identities of those visiting our website. To find out more about our use of cookies you can visit our privacy and cookies statement. Note however if you continue to use the website your consent to cookies is implied.