SECURE YOUR DIGITAL FUTURE

“Most people are starting to realize that there are only two different types of companies in the world: those that have been breached and know it and those that have been breached and don’t know it.” – Ted Schlein

SERVICES AT A GLANCE

ATTACK AND PENETRATION TESTING

The aim of penetration testing is to perform an attack against your network infrastructure, mobile or web applications in order to identify and report on any security vulnerabilities.

This is where you hire us as your white-hat hacking team.

We provide you with a detailed report noting all vulnerabilities and remediations. Vulnerabilities are scored on severity and impact, allowing you to plan a strategy for remediation.

Penetration Testing is the starting point in ensuring you are one step ahead of cyber-criminals.

CONTINEOUS RED-TEAM ASSESSMENTS (CRT)

Because an organisation’s security is only as strong as its weakest link, red-team assessments fill the gap by assessing all areas of your organisation including the physical and human element.

These assessments are usually performed over a period of 12 months and aims to identify vulnerabilities on an ongoing organisation-wide level, leveraging any means possible.

Some of our methods include: OSINT (Open-source Intelligence), Email Spoofing, Phishing & Spear Phishing attacks, Email Account Penetration testing, Phone & email based Identify Spoofing , Social Media Scraping, Access Control Assessments, Installation of RAT (Remote Access Tools), Embedded & Peripheral Device Hacking

MOBILE APPLICATION ASSESSMENTS

Whether your mobile application uses web- based components or is built using a native language, Alpha-Kinetic Systems’ mobile assessments uses a manual hands-on approach to identify and report on vulnerabilities.

Our security experts, being mobile developers themselves, will provide your organisation insight into how well your application protects sensitive information by assessing business-logic attacks, penetration testing and vulnerability assessments against the application itself as well as any connected API.

WEB APPLICATION ASSESSMENTS

Web application assessments identify and report on security issues relating to Web-Applications. In order to identify vulnerabilities, a manual hands-on method as well as industry standard security applications are used.

Your web-application will be assessed by security experts with a Web- Application development background providing insight that no automated tool alone can provide.

SECURITY ADVISORY SERVICES

As part of our month-to-month managed security services, we provide advisory services in order to keep your organisation updated with the latest cyber security trends and vulnerabilities.

Advisory services are catered towards your organisation’s specific network infrastructure, systems or applications to ensure that an unpatched vulnerability or new security risk does not catch your organisation off-guard.

We'll make you an offer

We'll provide you with a free penetration test

To keep us on our toes, we’ll provide you with a free black-box penetration test on one of your web or mobile applications, together with a brief summary of our findings.

If you require the full report detailing all vulnerabilities, methods of exploitation and recommendations, we will provide this to you at industry related rates.

OUR R4 PROCESS
01

Review

We’ll evaluate your system(s) and source code.

02

Report

We’ll provide you with a report on our findings.

03

Resolve

You resolve and patch vulnerabilities.

04

Repeat

Hopefully both of us enjoyed the process and agree on a long-term relationship.

On a more personal note, my wish is that our security solutions will help you thrive and stay on top of your game so that all of us can continue to fill the ITC landscape with passion and potential.

André Jacobs

FOUNDER, Alpha-kinetic Systems

Get in touch

Scroll to top