Citation Cyber are an industry-leading cyber security company. Citation Cyber's main focus is to provide dynamic cyber security offerings that extend beyond technology, encompassing people, culture, processes and even the physical environment to make your business as resilient as possible. Founded in 2012, with a team of professionals with decades of experience, we offer services to businesses and firms to increase their cyber resilience.
We combine knowledge and integrity to provide essential support for securing your data, assets, and intellectual property against the threat of cybercrime. Our professional team of Certified Testers, qualified Consultants, Information Security professionals and expert NCSC Certified Trainers offer a complete end-to-end repertoire of cyber security services for you.
Citation Cyber is an industry-leading cybersecurity company. Citation Cyber’s main focus is to provide dynamic cyber security offerings that extend beyond technology, encompassing people, culture, processes and even the physical environment to make your business as resilient as possible. Founded in 2012, with a team of professionals with decades of experience, we offer services to businesses and firms to increase their cyber resilience.
Cyber Hack:
Infrastructure penetration testing
Web application penetration testing
Network security testing
Remote access security testing
Wireless security testing
Mobile security testing
Data security health check
Code level security assessment
Social engineering penetration testing
CREST Qualified Consultants:
CREST Practitioner Security Analyst
CREST Registered Penetration Tester
Contact:
Zain Javed
Contact CREST Member, Citation Cyber
Fill out your details and a member of our team will contact you shortly. "*" indicates required fields
"*" indicates required fields
Citation CyberCitation Cyber
Arrange a Citation Cyber Call Back
Fill out your details and a member of our team will contact you shortly. "*" indicates required fields
"*" indicates required fields
Citation Cyber Contact Details
Address: Health Innovation One, Sir John Fisher Drive, Lancaster University, Lancaster, LA1 4AT
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.