Our Services

External and Internal Network Security Testing

Our consultants will assess your organisation’s external and internal IT footprint. We will report on such things as unpatched systems, possible forgotten or legacy devices, devices with weak usernames and passwords as well as other factors which would be of interest to malicious hackers.

Web Application Testing

Halo I.S security consultants will assess web and internal applications for a wide range of vulnerabilities including those detailed in the OWASP Top 10. The aim of the assessment is to alter the way in which the target application processes requests with the goal of obtaining information, leveraging or simply disrupting systems or staff. Consultants then report all findings, so that issues can be remediated.

Phishing Assessments

Do you know how effectively your staff could spot a potential suspicious email? With ever-changing techniques, malicious emails and attachments are becoming harder to spot. Our phishing assessments are tailored around each client’s individual requirements in a surprisingly short amount of time. Combining the assessments with user training provides a tangible way of measuring progress.

Social Engineering

Our security consultants don’t only hack IT systems, they are also highly skilled in exploiting the weaknesses in processes by leveraging human behaviour. We use defined techniques in order to ensure that your trusted gatekeepers are aware of the risks they face and are prepared. Ask us for more details on our approach.

Firewall Review

Halo I.S consultants are able to assess firewall implementations on two levels. The first is at network level which we can include as part of the external infrastructure assessment. If a deeper assessment is required, our consultants can provide a comprehensive firewall configuration review, which would focus on device misconfigurations, legacy and overly permissive rules, common vulnerabilities and security best practices.

Server and Client Build Review

Servers and client machines are at the core of any large enterprise. Our server and client build reviews assess each version of hardware for potential vulnerabilities that could enable malicious trusted or untrusted users to perform tasks outside of their trusted remit.

Wireless Network Testing

Wireless network testing can often be included as part of an internal assessment for a very small amount of additional time. For a network that can often be easily accessed outside of your organisation’s walls, it makes perfect sense to ensure the security controls implemented are robust.

Our Services

External and Internal Network Security Testing

Our consultants will assess your organisation’s external and internal IT footprint. We will report on such things as unpatched systems, possible forgotten or legacy devices, devices with weak usernames and passwords as well as other factors which would be of interest to malicious hackers.

Web Application Testing

Halo I.S security consultants will assess web and internal applications for a wide range of vulnerabilities including those detailed in the OWASP Top 10. The aim of the assessment is to alter the way in which the target application processes requests with the goal of obtaining information, leveraging or simply disrupting systems or staff. Consultants then report all findings, so that issues can be remediated.

Phishing Assessments

Do you know how effectively your staff could spot a potential suspicious email? With ever-changing techniques, malicious emails and attachments are becoming harder to spot. Our phishing assessments are tailored around each client’s individual requirements in a surprisingly short amount of time. Combining the assessments with user training provides a tangible way of measuring progress.

Social Engineering

Our security consultants don’t only hack IT systems, they are also highly skilled in exploiting the weaknesses in processes by leveraging human behaviour. We use defined techniques in order to ensure that your trusted gatekeepers are aware of the risks they face and are prepared. Ask us for more details on our approach.

Firewall Review

Halo I.S consultants are able to assess firewall implementations on two levels. The first is at network level which we can include as part of the external infrastructure assessment. If a deeper assessment is required, our consultants can provide a comprehensive firewall configuration review, which would focus on device misconfigurations, legacy and overly permissive rules, common vulnerabilities and security best practices.

Server and Client Build Review

Servers and client machines are at the core of any large enterprise. Our server and client build reviews assess each version of hardware for potential vulnerabilities that could enable malicious trusted or untrusted users to perform tasks outside of their trusted remit.

Wireless Network Testing

Wireless network testing can often be included as part of an internal assessment for a very small amount of additional time. For a network that can often be easily accessed outside of your organisation’s walls, it makes perfect sense to ensure the security controls implemented are robust.

Menu