Founded in 2007, Razorthorn has been delivering expert cyber security consulting and testing services to some of the largest and most influential organisations in the world, including many in the Fortune 500. The company has a single purpose: to defend business-critical data and applications from cyber attacks and internal threats. Our cyber solutions team works closely with each client to understand what drives them, where they are going and what really matters.
Razorthorn is well known in the industry for excellence and has been recognised by Gartner as a market leader for professionalism and quality in the delivery of PCI DSS consultancy and advice.
Focused on clients’ key business objectives, Razorthorn excels in building and developing cyber strategies unique to our clients’ needs. Whether that is simply ad-hoc information security consultancy or a fully managed cyber security solution, we have the skills and knowledge to deliver best in class services.
Razorthorn Penetration testers are highly experienced professionals, accredited by world leading standards and certifications. Providing both internal and external penetration testing for virtually any scenario such as; infrastructure penetration testing, wireless penetration testing, Web application penetration testing and mobile application penetration testing.
They will use one of the following strategies: Black Box Testing, Grey Box Testing or White Box Testing, and the methodology used is aligned with industry best practices such as OWASP. Our testers always have at least 5 years of experience within a number of different environments.
CREST Qualified Consultants:
CREST Practitioner Security Analyst
Contact:
Jamie Hayward
Contact CREST Member, Razor Thorn Security Ltd
Fill out your details and a member of our team will contact you shortly. "*" indicates required fields
"*" indicates required fields
Razor Thorn Security LtdRazor Thorn Security Ltd
Arrange a Razor Thorn Security Ltd Call Back
Fill out your details and a member of our team will contact you shortly. "*" indicates required fields
"*" indicates required fields
Razor Thorn Security Ltd Contact Details
Address: 2nd Floor 4 St Johns Road Tunbridge Wells Kent TN4 9NP UK
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.