Information security experts for over 20 years.
At Pentest, we believe that information security assurance requires more than a one size fits all approach. That’s why our information security testing services have been designed to go further.
Founded in 2001, we work in partnership with our clients, providing them with bespoke and adaptable testing services to ensure they can be as confident as possible in their information security, whether it be their internal systems or applications developed for third parties.
It’s this approach, as well as our technical capability, that has led us to develop long-term working relationships with organisations across the world, from global tech companies, with large, complex test requirements through to small companies requiring a single annual test.
We're here to provide you, and your clients, with the information security confidence you need. Whether your organisation is big or small, security mature or just starting out, we work in partnership with you to understand your security requirements, put your security to the test, support your improvement efforts and ultimately, provide you with the information security confidence you need.
As we often say, we’re here to be your trusted information security advisor, not just a test provider.
- Information Security Consultancy
- Compliance & Due Diligence
- Red Team Services
- Infrastructure Testing
- Web Application Testing
- Mobile Application Testing
- Wireless Network Testing
- Cloud Service Testing
- Embedded Device/IoT Testing
- ICS/SCADA Testing
- Agile Development Testing
+44 (0)161 233 0100
Our penetration testing approach has been refined over 20 years, ensuring testing meets your exact requirements and providing you with the security confidence you need around your applications, infrastructure, cloud services, wireless networks, IoT devices & industrial systems.
So, what does our approach to penetration testing look like?
1. Robust Scoping
We take the time to fully understand your requirements, the outcomes you want to achieve and the environments under review. Using this information, our experience and our consultant’s expertise, we will put forward a bespoke test proposal that will help not only achieve the results you require, but also provide value for money.
2. Expert Testing
Our manual testing is designed to fully challenge your security, that’s why we only hire the best security consultants. All our consultants are directly employed by us and have been through a rigorous recruitment process, ensuring we provide the most comprehensive testing possible.
Our reporting process can be tailored to your specific needs, whether you require in-test notifications, integration with ticketing systems such as Jira, or a full walkthrough of the issues found. We endeavour to fit our reporting around you, not the other way around.
When it comes to your full test report, we will provide a managerial overview alongside a full technical analysis backed by the technical evidence. This includes a prioritised list of all vulnerabilities found, their implications and our recommendations for addressing identified security risks in a planned manner.
4. Post-Test Support
Our job doesn’t finish on delivery of a test report. Our consultants will be made available following the report to assist with the interpretation findings, support stakeholders during remediation and pass on our wealth of expertise.
5. Fix Check & Additional Documentation
We can provide a fix check at the end of the remediation process, ensuring that issues found during testing have been successfully fixed or mitigated. Additional documentation such as a letter of opinion, can also be provided for third-party assurance purposes.
6. Ongoing Partnership
We act as a trusted information security partner to our clients, not just a test provider. This means we welcome clients contacting us outside of testing engagements with any security questions or concerns they may have.
CREST Qualified Consultants:
- CREST Practitioner Security Analyst
Contact: Lulu Eden