CREST-Certified Penetration Testing
Identify and resolve concealed vulnerabilities within your organisations’ security.
Get a quote now
Peritus takes pride in building and nurturing the best cyber talent to ensure our penetration testing services always get the best security outcomes. Our global teams of OSCP & CREST penetration testers highly skilled, speak at security events and have discovered CVEs.
Their years of experience delivering expert penetration tests for all types of engagement: network, infrastructure, web app, API, mobile app, cloud, and more. When you need a penetration test to deliver a trusted security assessment, you can rely on us.
Types of Pen Test
-
Wireless Assessment
By their nature, wireless networks provide flexibility and mobility for staff members moving around the office, ensuring that the configuration of the wireless network is secure and that any segregation is effective can provide assurance for all wifi users.
-
Web Application/API Assessment
A web application assessment or API assessment is performed against a customer’s environment highlighting vulnerabilities or misconfigurations that could be leveraged by users of the application, testing is performed in-line with the OWASP testing methodology.
-
Cloud Pen Test
An in-depth review of the AWS/GCP/Azure environment including the configuration of the account itself including IAM roles, network configuration etc. to ensure that the cloud environment is configured in-line with industry best practices.
-
Network Pen Test
An external infrastructure assessment is performed on any internet facing assets within the organisation such as web, email or FTP servers along with an internal infrastructure assessment performed within the customer's network, highlighting vulnerabilities or misconfigurations that could be leveraged by a malicious insider or an external attacker with access to the internal network via phishing or some other method.
-
Mobile Device Configuration Pen Test
This type of assessment is focused on ensuring that mobile devices are configured in-line with industry best practices. Testing will focus on the security configuration of the device including encryption, authentication settings and network security checks.
Get more with Peritus Penetration Testing
Why Peritus
Our capabilities as a cyber security specialist focus on providing disruptive security technologies, services, and bespoke professional service engagements. We aim to help our customers stay ahead of the curve by evaluating fast-growing and innovative technologies that enhance and complement their security environments. At Peritus, we value our customers as more than just numbers; we consider them design partners. Once they onboard with us, we become an extension to their security teams.
We understand that each customer has unique needs, and therefore, we do not adopt a 'one-size-fits-all' approach. As specialists in the market, we excel in security and focus on delivering solutions tailored to our customers' specific requirements.