VULNERABILITY & SECURITY POSTURE ASSESSMENT SERVICES

Working with industry, CREST has developed and implemented a rigorous accreditation process for organizations providing penetration testing. It has been designed to define good practice within the industry and to provide buyers with an indication of high quality. CREST membership is seen as an aspiration for service suppliers and the de-facto requirement in many sectors. Being a CREST Approved Member, Firmus abide to the guidelines and processes approved by CREST.

null

Network Penetration Testing

Network Penetration testing is one of the important area to look at when your organization is relying heavily on technology…

null

Web Application Penetration Testing

Almost all organization has their websites. It can either be their corporate website, customer portal, webmails and etc…

null

Source Code Review

Source Code review is one of the best way to identify security flaws in an application. It can either be a web application…

null

Mobile Application Penetration Testing

Mobile Application has grown very fast in the world nowadays. Almost everyone has a mobile device…

null

Policy Compliance Assessment

Operating Systems, Databases and Network Devices comes with their own set of configurations…

null

Social Engineering

Social Engineering is an art of hacking human. As humans are always the weakest link in any organization…

null

Wireless Penetration Testing

Almost all of the organization nowadays have adopted to wireless setup more than the wired setup…

null

Cyber Attack Assessment

Cyber Attack Assessment is a service to ensure that all those network / security devices that was bought by…

null

Compromise Assessment

The objective of a compromise assessment is to identify if an attacker is already in the organization’s network. As normal penetration testing…

null

ISMS 27001:2013 Gap Analysis

Firmus can assist organizations seeking to establish an Information Security Management System in accordance…

null

Network Penetration Testing

Network Penetration testing is one of the important area to look at when your organization is relying heavily on technology…

null

Web Application

Almost all organization has their websites. It can either be their corporate website, customer portal, webmails and etc…

null

Source Code Review

Source Code review is one of the best way to identify security flaws in an application. It can either be a web application…

null

Mobile Application

Mobile Application has grown very fast in the world nowadays. Almost everyone has a mobile device…

null

Policy Compliance Assessment

Operating Systems, Databases and Network Devices comes with their own set of configurations…

null

Social Engineering

Social Engineering is an art of hacking human. As humans are always the weakest link in any organization…

null

Wireless Penetration Testing

Almost all of the organization nowadays have adopted to wireless setup more than the wired setup…

null

Cyber Attack Assessment

Cyber Attack Assessment is a service to ensure that all those network / security devices that was bought by…

null

Compromise Assessment

The objective of a compromise assessment is to identify if an attacker is already in the organization’s network. As normal penetration testing…

null

ISMS 27001:2013 Gap Analysis

Firmus can assist organizations seeking to establish an Information Security Management System in accordance…

If you are not penetration testing your web site, someone else will and they don’t work for you.