Context Information Security

We offer our services in the following countries:

EMEA The Americas Asia Australasia
Penetration Testing  ✓
Simulated Target Attack & Response  ✓  ✓  ✓
Threat Intelligence
Cyber Security Incident Response  ✓  ✓  ✓
Cyber Essentials

 

Address: 11 Westferry Circus
London
E14 4HD
Girardetstr.8
Haus 9, Eingang 5, Ebene 3
45131 Essen
Germany
Ernst-Ludwig-Ring 2
61231 Bad Nauheim
Germany
Telephone: +44 (0)20 7537 7515 +49 (0)201 8777 8550 +49 (0)603 2949 7917
Email: [email protected] [email protected] [email protected]
Website: http://www.contextis.com http://www.contextis.com http://www.contextis.com
Contact: Rachel Shaw
[email protected]Rachel O’Brien
[email protected]
Sven Schlueter Steve Matthews

Context is a highly skilled cyber security consultancy that supports organisations to meet their ever evolving information security challenges.  We provide specialist consultancy services that include cyber strategy and advisory, penetration testing, incident response and investigations, and technical security research.

Established in 1988, Context has a client base that includes many high profile blue chip companies, alongside public sector and government organisations.  An exceptional level of technical expertise underpins all of our services while a detailed and comprehensive approach helps clients to attain a deeper understanding of security vulnerabilities, threats or incidents.

Capabilities

Penetration Testing

Contact: Owen Wright
+44 (0)20 7537 7515
[email protected]
https://www.contextis.com/services/penetration-testing

Context’s security testing services are trusted by our clients, including high profile organisations and Government institutions, to help protect mission-critical applications and architectures.

We provide a full range of penetration testing and technical security assessment services.  These include CHECK and CREST-approved application and infrastructure penetration testing, as well as mobile application and device assessments, device security reviews and bespoke testing mirroring the techniques used by real-world attackers.

Context’s testing capability is delivered by a diverse and skilled team of consultants in the UK, Germany and Australia, backed by continual service development and cutting-edge research.

CREST Qualified Consultants:
Practitioner Security Analysts:  Yes
Registered Penetration Testers:  Yes
Certified Web Application Testers:  Yes
Certified Infrastructure Testers:  Yes
Certified Wireless Testers:  No

Simulated Target Attack & Response (STAR) Penetration Testing

Contact: Owen Wright
+44 (0)20 7537 7515
[email protected]
https://www.contextis.com/services/simulated-targeted-attacks-red-teaming

Context have long championed using intelligence-led penetration testing to improve the realism, depth and relevance of security testing.  Using real data about attackers’ tactics, techniques and procedures from our Response team and elsewhere, we perform focused and realistic exercises that map to sophisticated attacks.  STAR assessments allow Context to test an organisation’s overall capability to prevent, detect and respond to a targeted attack.  Context were also privileged to assist with the development of the technical and risk management approaches used for STAR and CBEST.

CREST Qualified Consultants:
Certified Simulated Attack Managers:  Yes
Certified Simulated Attack Specialists:  Yes

Cyber Security Incident Response

Contact: Peter Barbour
[email protected]  / [email protected]
https://www.contextis.com/services/incident-response-and-planning

Context is a Cyber Incident Response scheme company experienced in providing a full range of threat detection, investigation management, forensics, response and protection services.  Context handles incident response and incident management requirements for organisations of all sizes, from the largest and most complex breaches for FTSE100 organisations, down to SMEs for whom the incident is still of absolute criticality.  Context Response consultants will work with you to fully understand the issues and propose the most appropriate solution.

CREST Qualified Consultants:
Registered Intrusion Analysts:  Yes
Certified Network Intrusion Analysts:  Yes
Certified Host Intrusion Analysts:  Yes
Certified Malware Reverse Engineers:  No
Certified Incident Managers:  Yes

Security Architecture

CREST Qualified Consultants:
Registered Technical Security Architects:  Yes

Cyber Essentials

To find out more about our Cyber Essentials service, please click here.