We offer full, CREST and CHECK approved, penetration testing (also known as an IT Health Check, ICT Health Check or a pentest) services for internal and external networks. We cover all areas of penetration testing such as applications, infrastructure, PCI DSS, mobile, build reviews,
cloud hosting, wireless, database reviews and vulnerability assessments.
Penetration testing (also known as a pentest or pentesting) is an authorised simulated attack on a computer system, network or web application to identify vulnerabilities that could be exploited. Testing should be conducted from outside the organisation (external testing) and from inside the organisation.
The vulnerabilities identified are reported back to the system owner along with mitigation recommendations.
Penetration testing can also be used to test an organisation's compliance with security policies, the security awareness of its staff and how effectively it can respond to security threats.
A penetration test can provide assurance that the systems and security controls tested have been configured in accordance with best security practice and that there are no common or publicly known vulnerabilities in the target system at the time of the test. If vulnerabilities are found these can be rectified before an attack or security breach occurs.
Penetration testing will enable you to:
- Manage vulnerabilities
- Avoid extra cost and reputation damage from a security breach
- Provide evidence of compliance with regulatory and certification standards
- Provide assurance to customers and suppliers that their data is secure
Why Choose Armadillo?
Armadillo Sec are a CREST certified testing body and we are accredited to operate as a CHECK service provider. All of our testers are certified by CREST and our senior consultants are certified by CREST to the highest CCT Level. Our testers are also CHECK Team Leaders (CTL’s) or CHECK Team Members (CTM’s) and are approved to conduct government CHECK testing.
Our team have many years experience conducting a broad range of government and commercial tests and always aim to go the extra mile for our customers.
Easy To Understand Reports
If your team can’t understand the report, you may not fully be able to remediate the issues found. We offer a full report walk through with your team so they can plan remediation steps and understand the risk and impact to assets to ensure any findings are properly understood and can be resolved.
We are very proud of our report and we can provide you with a sample pentest report upon request.
No Cancellation Fees
We understand project deadlines can slip. If you do have to cancel at short notice we will not penalise you and instead work with you to adjust project timelines accordingly. If cancelled with 2 weeks’ notice, there is no charge at all. If cancelled with less than 1 week’s notice we will charge you the cost of the proposed activity, but this will be stored as testing credit for you for you to use when you are ready.
Frequently Asked Questions
Vulnerability assessments look for known vulnerabilities and report back potential exposures. It is normally an automated scan using a commercial tool. A penetration test aims to exploit and verify the weaknesses via a variety of different methods performed by the human tester.
Vulnerability tests often produce what is known as "false positives" where the software assumes certain issues or vulnerabilities based on criteria, but these may be incorrect. Therefore a penetration test is a much more realistic test to assess the risk levels of any detected vulnerabilities.
All our testers are certified by CREST and our senior consultants are certified by CREST to the highest CCT level.
|CREST Certifications||Certified Testers|
|Practitioner Security Analysts|
|Registered Penetration Testers|
|Certified Web Application Testers|
|Certified Infrastructure Testers|
|Certified Simulated Attack Specialist|
|Certified Simulated Attack Manager|
Our CREST member status can be viewed, along with the certified tester types we have on the below link:
Our testers are also CHECK Team Leaders (CTL's) or CHECK Team Members (CTM's) and are approved to conduct government CHECK testing.
|CHECK Status||Certified Testers|
|CHECK Team Member (CTM)|
|CHECK Team Leader (CTL) - Infrastructure|
|CHECK Team Leader (CTL) - Applications|
Our CHECK status can be viewed on the below link:
It is recommended that external and internal penetration testing should be conducted annually as cyber threats are constantly evolving.
If major changes are made to the infrastructure or new applications are developed, then it is recommended that additional testing is conducted. This ensures that any recent changes are not introducing new vulnerabilities into the environment.
Some certifications such as ISO 27001 or PCI DSS, require a certain frequency of testing to remain compliant.
Penetration testing is bespoke depending on the goal or outcome you wish to achieve, therefore there is not an off-the-shelf price for a penetration test.
For each project we will technically scope your requirements and establish the time needed to complete the work. We will then provide a detailed proposal and breakdown of costs and options.
We supply a full penetration testing report, which covers the following:
- Executive management summary - Non technical overview of issues for management board level
- Detailed technical findings - A complete list of all issues identified
- Affected Hosts - A list of all hosts affected, including the associated network port
- Risk Level - Impact, likelihood and overall risk ratings are listed for each issue
- Examples - Output or screenshots to demonstrate the issue
- Recommendations - Recommendations of how to remediate the issues, including any reference to documents that can assist
A sample report can be supplied upon request.
We have a full methodology for all testing services we provide, which is supplied with each project proposal. This outlines the testing steps and all the requirements in order to deliver the test.
All of our application testing methodology aligns to the OWASP top 10 standard, which is the industry standard for application security.