Context Information Security

Context v4

 

Address: 11 Westferry Circus
London
E14 4HD
Girardetstr.8
Haus 9, Eingang 5, Ebene 3
45131 Essen
Germany
Ernst-Ludwig-Ring 2
61231 Bad Nauheim
Germany
Telephone: +44 (0)20 7537 7515 +49 (0)201 8777 8550 +49 (0)603 2949 7917
Email: [email protected] [email protected] [email protected]
Website: http://www.contextis.com http://www.contextis.com http://www.contextis.com
Contact: Rachel Shaw
[email protected]Rachel O’Brien
[email protected]
Sven Schlueter Steve Matthews
Address:  Suite 5079
5th Floor
25 Broadway
New York NY10004
USA
 155 Queen Street
Melbourne
Victoria 3000
Australia
3 Spring Street
Sydney
New South Wales 2000
Australia
Telephone: +1 917 880 3130 +61 1300 565 352 +61 1300 565 352
Email: [email protected]
[email protected]
Website: http://www.contextis.com http://www.contextis.com 
Contact: Max Deighton Kirk Stephen
[email protected]
Lukasz Gogolkiewicz
[email protected] 
Terry Swan
[email protected]

Context is a highly skilled cyber security consultancy that supports organisations to meet their ever evolving information security challenges.  We provide specialist consultancy services that include cyber strategy and advisory, penetration testing, incident response and investigations, and technical security research.

Established in 1988, Context has a client base that includes many high profile blue chip companies, alongside public sector and government organisations.  An exceptional level of technical expertise underpins all of our services while a detailed and comprehensive approach helps clients to attain a deeper understanding of security vulnerabilities, threats or incidents.

Capabilities

Penetration Testing

Contact: Owen Wright
+44 (0)20 7537 7515
[email protected]
https://www.contextis.com/services/penetration-testing

Context’s security testing services are trusted by our clients – high profile organisations and Government institutions. We provide a full-range of penetration-testing and technical security assessment services; CHECK and CREST-approved application and infrastructure penetration-testing, as well as mobile application and device assessments, device security reviews and bespoke testing; mirroring techniques used by real-world attackers. Context’s capability is delivered by skilled consultants in the UK, Germany, USA and Australia, backed by continual service development and cutting-edge research.

CREST Qualified Consultants:
Practitioner Security Analysts:  Yes
Registered Penetration Testers:  Yes
Certified Web Application Testers:  Yes
Certified Infrastructure Testers:  Yes
Certified Wireless Testers:  No

Simulated Target Attack & Response (STAR) Penetration Testing

Contact: Owen Wright
+44 (0)20 7537 7515
[email protected]
https://www.contextis.com/services/simulated-targeted-attacks-red-teaming

When performing intelligence-led penetration testing, Context use specialist Threat Intelligence and real data about attackers’ tactics and techniques, gathered from our Response team and elsewhere.  We perform focused, realistic exercises mapped to sophisticated attacks.  STAR assessments allow Context to test an organisation’s capability to prevent, detect and respond to targeted attacks.  Context was also privileged to assist with the development of the technical and risk management approaches used for STAR, CBEST and other similar schemes.

CREST Qualified Consultants:
Certified Simulated Attack Managers:  Yes
Certified Simulated Attack Specialists:  Yes

Cyber Security Incident Response

Contact: Dave Spence
[email protected]  / [email protected]
https://www.contextis.com/services/incident-response-and-planning

Context is a Cyber Incident Response scheme company experienced in providing a full range of threat detection, investigation management, forensics, response and protection services.  Context handles incident response and incident management requirements for organisations of all sizes, from the largest and most complex breaches for FTSE100 organisations, down to SMEs for whom the incident is still of absolute criticality.  Context Response consultants will work with you to fully understand the issues and propose the most appropriate solution.

CREST Qualified Consultants:
Registered Intrusion Analysts:  No
Certified Network Intrusion Analysts:  Yes
Certified Host Intrusion Analysts:  Yes
Certified Malware Reverse Engineers:  No
Certified Incident Managers:  Yes

Security Architecture

CREST Qualified Consultants:
Registered Technical Security Architects:  Yes

Cyber Essentials

To find out more about our Cyber Essentials service, please click here.