Our team will work from within your internal network simulating the role of an attacker who has gained an initial foothold. From this position we will assess the integrity and configuration of your environment, looking to highlight weaknesses surrounding Active Directory, over privileged accounts, weak password policies and vulnerable systems and software.
Our consultant will look to move laterally through your network exposing and reporting on vulnerabilities along the way. A full report and remediation steps will be provided post assessment with the consultant on call to talk you through any concerns.
Our services can be one off or combined with training and conducted on a recurring basis, to give reassurance that the threats you face are being successfully mitigated.