Aon’s Cyber Solutions offers holistic cyber security, risk and insurance management, investigative skills, and proprietary technologies to help clients uncover and quantify cyber risks, protect critical assets, and recover from cyber incidents.
Cyber security services provided by our subsidiaries Gotham Digital Science Ltd, Stroz Friedberg Limited and their affiliates. Cyber risk services are provided by Aon UK Limited and its affiliates.
Aon provides in-depth, mature technical assessments against a full suite of penetration testing disciplines which provide assurances as well as highlight areas of weakness within your security posture. These disciplines include, but are not limited to, network/server infrastructure, web and mobile application testing, code review and reverse engineering. Choose from one of our security offerings to find out how our experience and capabilities can help in strengthening your security posture.
Aon specialises in delivering objective focused intelligence-led penetration testing services. These services simulate an active real-world threat actor by utilising the same tactics and techniques observed to be in use by the threat actor in a real-world incident. This type of assessment allows an organisation to gauge their abilities in detecting and responding to an attack of this nature, as well as highlight any failings in their policy and procedures when responding to an attack of this type. The assessment provides a true reflection of your organisation’s cybersecurity readiness.
Aon provides continuous vulnerability scanning for networks, web applications and APIs (both on the Internet andinternally) via its cloud-based managed scanning solution, CyberScan. CyberScan integrates leading commercial, open source and proprietary scanning technologies together with intelligent use of manual review and validation of results in order to deliver a scalable vulnerability assessment solution for all sizes of organisation – from SME to Enterprise.
Aon have over 10-years of experience of delivering scenario-based simulated attack projects for many of our global clients within the finance sector. Real-world scenario development is informed by output from internal/external threat intelligence partners ensuring an accurate and current assessment of enterprise security posture by simulating relevant adversarial attack and exploitation capabilities. These assessments are the most realistic way of exercising a financial services organisation’s overall capability to resist, detect and respond to an attack.
Security Architecture
CREST Qualified Consultants:
CREST Registered Technical Security Architect
Contact:
Darren Rackliff
Careers
No careers found.
Contact CREST Member, Aon
Fill out your details and a member of our team will contact you shortly. "*" indicates required fields
"*" indicates required fields
AonAon
Arrange a Aon Call Back
Fill out your details and a member of our team will contact you shortly. "*" indicates required fields
"*" indicates required fields
Aon Contact Details
Address: The Leadenhall Building, 122 Leadenhall Street, London, EC3V 4AN, UK
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.