Progressive Cyber Security

SECURE YOUR DIGITAL FUTURE

“Most people are starting to realize that there are only two different types of companies in the world: those that have been breached and know it and those that have been breached and don’t know it.” – Ted Schlein

SERVICES AT A GLANCE

VULNERABILITY ASSESSMENT

We employ industry standard vulnerability assessment tools to provide an overview of the overall security of your system. These scans provide a baseline for deeper vulnerability assessment.

SOURCE CODE REVIEWS

We provide white-box assessments by reviewing the source code of your web or mobile application thus providing an additional layer of security and ensuring no deliberate loopholes exist in your application.

PENETRATION TESTING

From a prying personal perspective we take an outsiders (black-box) view of your web or mobile application to provide you with a hands-on targeted security assessment. Like some malicious attackers, we'll take a systematic and thorough approach to assessing your security.

SOCIAL ENGINEERING AS A SERVICE

More than often the entry point into a system is not through the digital landscape but through your front door. By employing social engineering vectors, countless hackers have gained critical access by often exploiting the weakest link in the organisation, people.

POST-CONSULTATION

Not in the ITC space yourself?
We will do our best to provide you with recommendations on keeping your company secure.

We'll make you an offer

We'll provide you with a free penetration test

To keep us on our toes, we’ll provide you with a free black-box penetration test on one of your web or mobile applications, together with a brief summary of our findings.

If you require the full report detailing all vulnerabilities, methods of exploitation and recommendations, we will provide this to you at industry related rates.

OUR R4 PROCESS
01

Review

We’ll evaluate your system(s) and source code.

02

Report

We’ll provide you with a report on our findings.

03

Resolve

You resolve and patch vulnerabilities.

04

Repeat

Hopefully both of us enjoyed the process and agree on a long-term relationship.

On a more personal note, my wish is that our security solutions will help you thrive and stay on top of your game so that all of us can continue to fill the ITC landscape with passion and potential.

André Jacobs

FOUNDER, Alpha-kinetic Systems

Get in touch

Scroll to top