![Red teaming Red teaming](https://www.siq.si/wp-content/uploads/2020/10/01.png)
|
Simulate adversary and demonstrate how real-world attacker can achieve their goal. |
Test readiness to detect, respond, and prevent real cyber-attacks. |
![External penetration test External penetration test](https://www.siq.si/wp-content/uploads/2020/10/02-196x300.png)
|
Try to exploit “crown jewels” on external infrastructure (servers, applications, or even people). |
Provide you with proof of what assets can be compromised by an attacker. |
![Internal penetration test Internal penetration test](https://www.siq.si/wp-content/uploads/2020/10/03-193x300.png)
|
Check the effectiveness of internal security controls against an attacker or disgruntled employee with access to internal network resources. |
Harden your internal infrastructure network and ensure compliance with industry best practices. |
![Web Application penetration test Web Application penetration test](https://www.siq.si/wp-content/uploads/2020/10/05.png)
|
Find a vulnerability in an application that enables unauthorized access and modification of data. |
Uncover application vulnerabilities and identify problems you did not know exist. |
![Mobile application penetration test Mobile application penetration test](https://www.siq.si/wp-content/uploads/2020/10/04.png)
|
Find a vulnerability in a mobile application that enables unauthorized access and modification of data. |
Uncover application vulnerabilities and identify security controls you need to implement. |
|
|
|
![PSD2 revision PSD2 revision](https://www.siq.si/wp-content/uploads/2020/10/07-300x248.png)
PSD2 revision
|
Evaluate your systems to ensure that the proper technical controls are in place for PSD2 (SCA and dynamic linking). |
Ensure your business follows PSD2 technical standards. |
![Social engineering Social engineering](https://www.siq.si/wp-content/uploads/2020/10/08-268x300.png)
|
Test employees’ susceptibility to social engineering, identify weaknesses in processes, procedures, and technology with a clear path to remediation. |
Determine the effectiveness of information security policies, measure and improve the level of information security awareness. |
![Wireless Technology Assessment Wireless Technology Assessment](https://www.siq.si/wp-content/uploads/2020/11/10-300x300.png)
Wireless Technology Assessment
|
Determine an attacker ability to gain unauthorized access to your wireless network. |
Understand wireless network exposure and security level. |
![Swift Assessment Swift Assessment](https://www.siq.si/wp-content/uploads/2020/11/16-300x223.png)
Swift Assessment
|
Evaluate your systems to ensure that the proper Swift Framework controls are in place. |
Ensure your business follows Swift Framework requirements. |
|
|
|
![Blockchain Blockchain](https://www.siq.si/wp-content/uploads/2020/11/12-283x300.png)
|
Determine the security level on all aspects of the blockchain solution you are using. |
Ensure your customers data and assets are safe. |
![Software review / Functional testing Software review / Functional testing](https://www.siq.si/wp-content/uploads/2020/11/13-300x258.png)
|
Check if the software performs only documented functionalities. |
Ensure software-specific requirements or goals are met. |
![Malware analysis Malware analysis](https://www.siq.si/wp-content/uploads/2020/11/14-300x252.png)
Malware analysis
|
Identify the type of malware that lies at the root of a specific incident. |
Understanding the extent of an incident and whether there are any more hosts or systems that could be affected. |
![IoT and embedded device IoT and embedded device](https://www.siq.si/wp-content/uploads/2020/11/15-300x239.png)
IoT and embedded device
|
Determine the security of IoT devices and their associated services. |
Understand the threats connected devices can pose to consumers. |