Secure Host Configuration Assessment
It doesn't matter how secure your software is, if the underlying operating system is not properly hardened, it's only a matter of time before this is taken advantage of to compromise the entire system. That's why we believe that a Secure Host Configuration Assessment is important, as it identifies vulnerabilities that cannot be detected through network-based testing.
Our Secure Host Configuration Assessment will audit your host security configuration against industry best practice standards such as the latest Center for Internet Security (CIS) benchmarks to ensure your hosts are iron-clad when it comes to security.
Restricted Environment Breakout Test
Many organisations provide a virtual desktop interface for employees to access when working remotely, such as Citrix Workspace. Typically, these virtual desktops are restricted, only allowing employees to access the resources they require to operate effectively.
However, these virtual desktops reside on real infrastructure that typically is directly connected to the organisation's internal network. If an attacker can break out of the restricted environment, chances are good that they will be able to access sensitive company information without needing to connect to the internal network themselves or compromise a staff member’s computer.
Our Restricted Environment Breakout Test finds the techniques and methods that attackers can use to break out of the virtual desktop jail and compromise the underlying virtual desktop host and connected systems.