Reset your Security Roadmap

With the goal of identifying issues and gaps in the security posture, our assurance services help organisations reset and design their security roadmap.  We understand there is no one-size-fits-all in cyber security. We tailor our services to help our customers put effective controls in the right places to help them improve their security posture and reduce their risk of breach.

person solving puzzle

Penetration Testing

Penetration Testing is focused on locating weaknesses in your systems before an attacker does. Sentaris security consultants have extensive experience in testing some of Australia’s largest and most complex systems.

Our testing methodology blends a baseline of automated testing with a heavy focus on manual assessment and testing of high-risk components. Furthermore, our methodology and practices extend beyond traditional testing whilst we delve into high-risk business logic issues. This approach has the advantage of being cost effective and comprehensive, while focusing on high-risk, high-impact weaknesses.

  • Web App Pen Test
  • Corporate Network Pen Test
  • Mobile Pen Test
servers

Red Teaming

Sentaris’ Scenario Testing service (aka Red-teaming) is a Penetration Testing methodology that moves away from the traditional testing of systems and applications. It focuses on real-world compromises that your business relies on such as:

  • Theft of customer data
  • Financial information
  • Other sensitive intellectual property.

Scenario Testing has the advantage of simulating the methodology used by attackers. This provides your organisation a more comprehensive assessment across a broader range of controls. These include traditional technical controls, physical security, businesses processes and user awareness. Scenario Testing provides greater assurance against sophisticated cyber attacks.

IT hardware systems

Control Effectiveness Testing

Security Controls are often tested for usability, but seldom for their effectiveness of mitigating the threats they are implemented to protect.  We use our extensive security and business experience to assess your existing security controls against the latest security threats. We ensure your controls are not only effective, but relevant to the modern security landscape.

People in security management meeting

Social Engineering

Social engineering is a process attackers use to trick employees to divulge confidential or personal information that they can use to build and execute attacks against an organisation. Sentaris can test both your employees, and systems, for resilience against a targeted attack.

person inputting credit card details online

Internet Footprint Assessment

An internet footprint assessment focuses on information discovery in order to determine and collate publicly available information pertaining to an organisation’s business practices, IT infrastructure, web applications, exposed services, customer and employee information, and more – all of which an attacker could pursue further as part of an attack on a target.  Extremely useful as a measure of asset identification to help organisations understand their footprint and formulate IT security strategies relating to possible vectors for attack.

password identification

Wifi Assessment

Sentaris can provide your business with an in-depth assessment of your wireless infrastructure seeking to identify weaknesses, using processes developed and enhanced throughout the years by our experienced security consultants.

Man providing security consulting services

Internal Posture Assessment

Corporate networks are a goldmine of information to attacks. Yet few organisations have even the most basic measures in place to help protect them.  Once an attacker gains a foothold in your environment, it is only a matter of time before they reach your valuable data.  We ensure your business has a strong foundation in place to detect, contain and respond to such threats.  Sentaris has a wealth of experience in both design, implementation and testing of security controls. We ensure your internal corporate network is underpinned by strong, relevant and current security practices.

Vulnerability Assessment

New vulnerabilities are disclosed daily.  Unless quickly detected and remediated in your environment, they can leave systems open to exploitation by attackers. Sentaris can provide you a regular vulnerability assessment service using specialised, automated tools to remotely assess your systems for publicly disclosed vulnerabilities. A regular vulnerability assessment program can highlight new and existing vulnerabilities in your environment. This will lead to a reduction in organisational risk.

Secure Code Review

Security code review is the process of auditing application source code to ensure that the best practice security controls are implemented. Sentaris will help you identify vulnerabilities within your application before discovered by malicious actors.  This practice is extremely effective at eliminating most previously unidentified vulnerabilities within an application. It ensures systems are more secure and protects business assets and reputation.

Contact Us to find out how we can help improve your business security

CONTACT US