Godeep

GodeepGodeepGodeep
Home
Services
goDeep
Login
News
Contact

Godeep

GodeepGodeepGodeep
Home
Services
goDeep
Login
News
Contact
  • Home
  • Services
  • goDeep
  • Login
  • News
  • Contact
  • Home
  • Services
  • goDeep
  • Login
  • News
  • Contact

Security Testing Services

DCT SECURITY Consultancy Services

Our Irish Cyber Security Team Are Here To Help

From Firewalls to email trying to get your head around IT Security can be daunting. That is where DCT Security come in to help. Our experienced team can audit your systems, train your team and test your networks. By spotting vulnerabilities and recommending important changes DCT Security keep your business  safe, secure and on guard against potential attacks. 

image35

Secure your First Line of Defence

Your company network and applications can be exposed if you don't maintain your security perimeter. 

DCT Security assess your network defences and highlight vulnerabilities, risks and treatments.

Firewall and External IP Security Assessment

Duration: 2-3 days

Port Scan

Scan all available ports to confirm that the services advertised comply with firewall policy and rules.

Enumeration

Enumerate all available services on the external IP

Vulnerability Scan

Perform (un)authenticated vulnerability scans on public facing servers.

Report

Provide clear findings and a prioritised list of actions, work efforts, and findings. 


Penetration Test for an SME company

Duration: 5-7 days depending on scope

The stages listed outline the basic steps that form a penetration test. Each penetration test is different and requires careful planning and scoping.

Discovery Phase

  

  • Use DNS enumeration techniques to discover mail servers and public routing information.
  • OSINT domain name to discover email address, staff and company details.

Enumeration Phase

  

  • Network discovery scanning and service enumeration.
  • Actively trying to obtain user names and application version information for running services.
  • Perform vulnerability scans.

Planning Phase

  

  • Map the profile of the environment to publicly known, or, in some cases, unknown vulnerabilities.
  • Discover and test possible exploits.

Exploitation Phase

  

  • Attempt to gain privileged access to a target system by exploiting the identified vulnerabilities.
  • Carry out password attack against public email accounts

Reporting Phase

  

  • Provide clear findings and a prioritised list matrix actions, work efforts, and findings. 

Out tests are built to suit your requirements and budget

Contact us for a quote

Download our brochure

DCT Security Testing Services (pdf)Download
image36
image37

Copyright © 2017 - 2021 DCT Security Limited - All Rights Reserved.


Privacy Policy

  • Privacy

Cookie Policy

This website uses cookies to improve your browsing experience. By continuing to use this site you agree to our use of cookies for analytics,  We do not use Cookies to find out the identities of those visiting our website. To find out more about our use of cookies you can visit our privacy and cookies statement. Note however if you continue to use the website your consent to cookies is implied.  

DeclineAccept & Close