Threat & Vulnerability Assessment
Get started here to verify your organisation and identity
Client Requirements:
- You must be the owner of the system or have explicit permission to have a third party security assessment performed against the target organisation.
- An understanding that while we are primarily relying on open source information sources, there is a chance that some requests may access the organisations systems. For example, DNS requests against discovered systems.
Deliverables:
- Detailed Security Report delivered within 72 hours.
- Report to contain discovered results and recommended remediation.
- Follow up questions to be conducted via email.
Post Office Box 230
302 Toyon Avenue, Suite F
San Jose, CA 95127-5441