top of page

Penetration Testing and Cyber Security Services

At Cyberoptic Security we offer a wide range of penetration and cyber security services. Below is a high level overview of the services we offer. If you are interested in how we could support your security, please contact us to arrange an initial consultation at no cost.

All of our services begin with understanding your business, your systems, and your unique requirements. Once this is properly understood we can then offer you the solutions that will provide the value you need.​

If you would like to know more about vulnerability scanning, pentesting, and red team exercises, please see our guidance here: The difference between a pentest, a vulnerbaility scan, and a red team.

CyberSafe Essentials

Get a full security check of your Microsoft 365, public website, and internet-facing systems, with real manual testing, not just automated scans.

Our CyberSafe Essentials package includes:

  • Microsoft 365 Secure Configuration Review

  • Manual Security Review of Internet Facing Assets

  • Manual Security Review of Your Corporate Website.

  • Fixed price of $5200

Secure Configuration Reviews

Our Secure Configuration Reviews are a systematic assessment of cloud or SaaS environments to identify and alert to insecure settings before they can be exploited.

 

It examines identity and access controls, network and perimeter configurations, data encryption, logging/monitoring, and best practice.

Our Secure Configuration Reviews include:

  • Amazon Web Services (AWS)

  • Azure

  • Microsoft 365 (M365)

  • Google Cloud Platform (GCP)

  • SaaS Solutions

Technical Controls Validation

Technical Controls Validation assesses the in place security defences that have been deployed to provide protection to your assets and services.

Cyberoptic will perform testing from a variety of perspectives to understand whether the controls are working as intended, and provide guidance on improving configuration. 

Technical Controls Validation includes:

  • Denial of Service (DoS) testing

  • Email security controls 

  • Workstation security 

  • Server security 

  • Network hardware

Penetration Testing

Cyberoptics penetration testing services seek to identify vulnerabilities and security issues within our clients systems.

We provide a detailed explanation of security issues that are discovered, and guidance on steps to remediate or mitigate issues.

Our penetration testing services include:

  • Web Applications

  • AI and LLMs

  • APIs

  • Mobile Applications

  • Internal Networks

  • External Networks

  • Hardware and IoT

  • Cloud Infrastructure

  • PCI Compliance

Vulnerability Scanning

Our Vulnerability Scanning services is an automated assessment of your internal or external network facing assets and web applications.

 

Results from these scans are manually reviewed to assess for false positives and to provide guidance on valid findings.

Vulnerability Scanning services include:

  • Internal Networks

  • External Networks

  • Web Applications

bottom of page