Host Security Testing

Host Security Testing

Prevent a breach and keep data out of reach.

Host-based Security Testing is critical as it allows us to identify vulnerabilities that cannot be detected through network assessments.

Through our host security services, we evaluate the security of your critical servers and the backbones of your technology infrastructure.

We analyse the operating system, application-level security issues and technical controls of your operating environments.

We offer Host Security Testing in two primary areas —

Secure Host Configuration Assessment

It doesn't matter how secure your software is, if the underlying operating system is not properly hardened, it's only a matter of time before this is taken advantage of to compromise the entire system. That's why we believe that a Secure Host Configuration Assessment is important, as it identifies vulnerabilities that cannot be detected through network-based testing.

Our Secure Host Configuration Assessment will audit your host security configuration against industry best practice standards such as the latest Center for Internet Security (CIS) benchmarks to ensure your hosts are iron-clad when it comes to security.

Learn More

Restricted Environment Breakout Test

Many organisations provide a virtual desktop interface for employees to access when working remotely, such as Citrix Workspace. Typically, these virtual desktops are restricted, only allowing employees to access the resources they require to operate effectively.

However, these virtual desktops reside on real infrastructure that typically is directly connected to the organisation's internal network. If an attacker can break out of the restricted environment, chances are good that they will be able to access sensitive company information without needing to connect to the internal network themselves or compromise a staff member’s computer.

Our Restricted Environment Breakout Test finds the techniques and methods that attackers can use to break out of the virtual desktop jail and compromise the underlying virtual desktop host and connected systems.

Learn More