We offer full, CREST approved, penetration testing (also known as an IT Health Check, ICT Health Check or a pentest) services for internal and external networks. We cover all areas of penetration testing such as applications, infrastructure, mobile, build reviews,
cloud hosting, wireless, database reviews and vulnerability assessments.
Penetration testing (also known as a pentest or pentesting) is an authorised simulated attack on a computer system, network or web application to identify vulnerabilities that could be exploited. Testing should be conducted from outside the organisation (external testing) and from inside the organisation.
The vulnerabilities identified are reported back to the system owner along with mitigation recommendations.
Penetration testing can also be used to test an organisation's compliance with security policies, the security awareness of its staff and how effectively it can respond to security threats.
A penetration test can provide assurance that the systems and security controls tested have been configured in accordance with best security practice and that there are no common or publicly known vulnerabilities in the target system at the time of the test. If vulnerabilities are found these can be rectified before an attack or security breach occurs.
Penetration testing will enable you to:
- Manage vulnerabilities
- Avoid extra cost and reputation damage from a security breach
- Provide evidence of compliance with regulatory and certification standards
- Provide assurance to customers and suppliers that their data is secure
Why Choose Armadillo?
Armadillo Sec are a CREST approved member company and our security consultants are fully certified by CREST to the highest level in application and infrastructure testing. This allows our consultants to give complete assurance when testing any elements of your environment. We have many years of experience leading large complex government and commercial cyber security tests. Our lead consultants will work with your from start to finish on the project to ensure all requirements are met.
Easy To Understand Reports
If your team can’t understand the report, you may not fully be able to remediate the issues found. We offer a full report walk through with your team so they can plan remediation steps and understand the risk and impact to assets to ensure any findings are properly understood and can be resolved.
We are very proud of our report and we can provide you with a sample pentest report upon request.
No Cancellation Fees
We understand project deadlines can slip. If you do have to cancel at short notice we will not penalise you and instead work with you to adjust project timelines accordingly. If cancelled with 2 weeks’ notice, there is no charge at all. If cancelled with less than 1 week’s notice we will charge you the cost of the proposed activity, but this will be stored as testing credit for you for you to use when you are ready.
Frequently Asked Questions
Vulnerability assessments look for known vulnerabilities and report back potential exposures. It is normally an automated scan using a commercial tool. A penetration test aims to exploit and verify the weaknesses via a variety of different methods performed by the human tester.
Vulnerability tests often produce what is known as "false positives" where the software assumes certain issues or vulnerabilities based on criteria, but these may be incorrect. Therefore a penetration test is a much more realistic test to assess the risk levels of any detected vulnerabilities.
Our testers are fully certified by CREST to the highest CCT level in both application and infrastructure testing.
Our CREST member status can be viewed, along with the certified tester types we have on the below link:
It is recommended that external and internal penetration testing should be conducted annually as cyber threats are constantly evolving.
If major changes are made to the infrastructure or new applications are developed, then it is recommended that additional testing is conducted. This ensures that any recent changes are not introducing new vulnerabilities into the environment.
Some certifications such as ISO 27001 or PCI DSS, require a certain frequency of testing to remain compliant.
Penetration testing is bespoke depending on the goal or outcome you wish to achieve, therefore there is not an off-the-shelf price for a penetration test.
For each project we will technically scope your requirements and establish the time needed to complete the work. We will then provide a detailed proposal and breakdown of costs and options.
We supply a full penetration testing report, which covers the following:
- Executive management summary - Non technical overview of issues for management board level
- Detailed technical findings - A complete list of all issues identified
- Affected Hosts - A list of all hosts affected, including the associated network port
- Risk Level - Impact, likelihood and overall risk ratings are listed for each issue
- Examples - Output or screenshots to demonstrate the issue
- Recommendations - Recommendations of how to remediate the issues, including any reference to documents that can assist
A sample report can be supplied upon request.
We have a full methodology for all testing services we provide, which is supplied with each project proposal. This outlines the testing steps and all the requirements in order to deliver the test.
All of our application testing methodology aligns to the OWASP top 10 standard, which is the industry standard for application security.