
Our Services
Penetration Testing
Cyberoptics penetration testing services seek to identify vulnerabilities and security issues within our clients systems.
​
We provide a detailed explanation of security issues that are discovered, and guidance on steps to remediate or mitigate issues.
​
Our penetration testing services include:
-
Web Applications
-
APIs
-
Mobile Applications
-
Internal Networks
-
External Networks
-
Hardware and IoT
-
Cloud Infrastructure
-
PCI Compliance
Vulnerability Scanning
Our Vulnerability Scanning services is an automated assessment of your internal or external network facing assets and web applications.
Results from these scans are manually reviewed to assess for false positives and to provide guidance on valid findings.
​
Vulnerability Scanning services include:
-
Internal Networks
-
External Networks
-
Web Applications
​
Secure Configuration Reviews
Our Secure Configuration Reviews are a systematic assessment of cloud or SaaS environments to identify and alert to insecure settings before they can be exploited.
It examines identity and access controls, network and perimeter configurations, data encryption, logging/monitoring, and best practice.
​
Our Secure Configuration Reviews include:
-
Amazon Web Services (AWS)
-
Azure
-
Microsoft 365 (M365)
-
Google Cloud Platform (GCP)
-
SaaS Solutions
Technical Controls Validation
Technical Controls Validation assesses the in place security defences that have been deployed to provide protection to your assets and services.
​
Cyberoptic will perform testing from a variety of perspectives to understand whether the controls are working as intended, and provide guidance on improving configuration.
​
Technical Controls Validation includes:
-
Denial of Service (DoS) testing
-
Email security controls
-
Workstation security
-
Server security
-
Network hardware
At Cyberoptic Security we offer a wide range of penetration and cyber security services. Below is a high level overview of the services we offer. If you are interested in how we could support your security, please contact us to arrange an initial consultation at no cost.
​
All of our services begin with understanding your business, your systems, and your unique requirements. Once this is properly understood we can then offer you the solutions that will provide the value you need.​
Let’s Work Together
Get in touch so we can start working together.