Security Services

Application Security

Web Application Penetration Test
RedPoint Security will attempt to penetrate the target web application to determine the effectiveness of your web application security controls. The test uses automated and manual tools to uncover vulnerabilities. Verification will also be performed to filter out any false positives commonly reported by automated tools. A report will be provided detailing all vulnerable controls, successful exploits, exploitation steps and recommendations on how to secure the vulnerabilities. The risk level based on the exposure of the vulnerability and the impact of exploiting the vulnerability will also be highlighted in the report.

Mobile Application Security Assessment
RedPoint Security will assess the actions of a target mobile application mainly the security of the protocol used, the data written and read to and from the mobile file system, vulnerable libraries used and the various functionalities of the mobile application. Any insecure actions or infringement of policies will be reported.

Thick Client Security Assessment
RedPoint Security will assess the actions of a target thick client application mainly the security of the protocol used, the data written and read to and from the file system, vulnerable libraries used and the various functionalities of the application. Any insecure actions or infringement of policies will be reported.

Code Review
RedPoint Security will review application code to search for code level vulnerabilities in critical modules. Code reviews will be performed by automated and manual tools. All vulnerabilities found will be verified. A report will highlight the vulnerabilities with remedy recommendations and risk ratings based on the impact of exploiting the vulnerability and the ease of which users can trigger the vulnerability.

Network Security

Network Security Vulnerability Assessment & Penetration Test
Network vulnerability assessment and penetration testing evaluates your organisation’s network infrastructure for known vulnerabilities that arises from security misconfiguration or missing patches. The assessment will test for vulnerabilities in servers and network devices such as web and database servers and firewalls. More…

Wireless Security Penetration & Discovery Test
Wireless access points if not configured correctly can be a route for hackers to penetrate your organization’s network without physical access to your office. A wireless penetration test will identify weakness or vulnerability in the access point’s configuration and setup. The test will discover rouge access points connected to your network. More…

Top