Security assessments of networks, systems, devices, and supporting services — scoped based on your environment, threat model, and requirements.
The Open-Source Intelligence (OSINT) Security Assessment evaluates information about an organisation that is publicly accessible without requiring direct interaction with internal systems or networks.
View details →The External Infrastructure Security Assessment evaluates the security posture of an organisation’s internet-facing systems and services.
View details →The Internal Infrastructure Security Assessment evaluates the security of systems, services, and controls within an organisation’s internal network environment.
View details →The Network Segmentation Security Assessment evaluates the effectiveness of network segmentation controls within an organisation’s environment.
View details →The Network Device Configuration Security Assessment evaluates the security posture of network devices through the review of their configurations and operational controls.
View details →The Environment Breakout Security Assessment evaluates the effectiveness of containment mechanisms designed to isolate systems, applications, or users within restricted environments.
View details →The Operating System Build Review Security Assessment evaluates the security posture of operating system builds against recognised security best practice and hardening standards.
View details →The Web Server Configuration Security Assessment evaluates the security posture of web server platforms through the review of their configuration and operational controls.
View details →The Active Directory Configuration Review Security Assessment evaluates the security posture of an organisation’s Active Directory environment through the review of its configuration, permissions, and operational controls.
View details →The Cloud Environment Security Assessment evaluates the security posture of cloud-hosted infrastructure and services across public, private, or hybrid cloud environments.
View details →The Firewall Configuration Security Assessment evaluates the security and effectiveness of firewall rules, policies, and associated controls within an organisation’s environment.
View details →The VPN Configuration Review Security Assessment evaluates the security posture of Virtual Private Network (VPN) implementations used to provide remote or site-to-site connectivity.
View details →The Voice Over IP (VoIP) Device Security Assessment evaluates the security posture of VoIP systems and associated devices within an organisation’s communications environment.
View details →The Database Configuration Review Security Assessment evaluates the security posture of database platforms through the review of configuration, access controls, and operational settings.
View details →The Secure Network Development Security Assessment evaluates the security considerations embedded within the design and implementation of network environments.
View details →The Stolen Device Security Assessment evaluates the security controls and operational readiness of an organisation in the event of a device being lost or stolen.
View details →The Mobile Device Configuration Security Assessment evaluates the security posture of mobile devices through the review of their configuration and applied security controls.
View details →The Mobile Device Management (MDM) Security Assessment evaluates the security posture and effectiveness of an organisation’s MDM solution and associated controls.
View details →The Wi-Fi Security Assessment evaluates the security posture of an organisation’s wireless network infrastructure and associated access controls.
View details →The Bluetooth Security Assessment evaluates the security posture of Bluetooth-enabled devices and their associated communication mechanisms within an organisation’s environment.
View details →All services are delivered subject to formal scoping, contractual agreement, and explicit authorisation.
If you would like to discuss an assessment or understand how Nanorisk can support your organisation, please get in touch.