Cybersecurity Project Delivery

We deliver & support large scale & complex information security projects

Cyber Security Project Delivery

Complex Data Centres, Security

Tools, Cloud, Systems & Networks

Risk-based

cyber security strategy

Architecture and design of  cyber security solutions including tactical, mid-teram and strategic

Our Expert Team

cybersecurity project implementation

End-to-end management of cybersecurity projects by our delivery-focussed hands on team of cybersecurity experts

operational technology cybersecurity

Operational Technology (OT), Industrial Control Systems (ICS) including safety-critical operational systems

Penetration Testing & Vulnerability Assessment

 End-to-end vulnerability management -  security testing, reporting, remedial actions, recommendations & rescan.

Active Engagement

We don’t just supply resources who work in silos and charge a day rate.

 

 We roll up our sleeves and deliver solid, technical security solutions

We Work as Part of your Team

We do more than just providing advisory guidance.

We act as your trusted partner.

 

We stay accountable for end-to-end management and delivery of your project

Flexible Pricing & Delivery Model

Our pricing model is based on skills need and technical complexity of your project

 

You can buy security products yourself, or we can source your products through our partners.

Why Work With Us?

Our Process

Cybersecurity Projects We Work On

Greenfield projects, transformation programmes, cloud projects, on-prem infrastructure projects, security during Merger & Acquisitions (M&A), technical roadmap delivery projects and technology refresh projects

Our Supported Technologies

  • Network security – Firewalls, IDS/IPS, Content Filtering, NAC, Antivirus, VPN, Remote Access, DDoS, Load Balancer, Web Application Firewall
  • Cloud Security – AWS & Azure IaaS, O365, Hybrid infrastructure
  • Email Security - Office365 EOP/ATP
  • Data security – Encryption, Data Loss Prevention, CASB, PKI, KMS, Identity Access Management, SSO and BYOD Security
  • Application security – OWASP, Secure SDLC, Code Review, RESTful API, Database (SQL) & SAP Security
0ju8_edited_edited.jpg
  • We use vulnerability assessment tool, Qualys Cloud Platform, rated industry leader by Gartner, Forrester and IDC to identify security vulnerabilities with six sigma (99.99966%) accuracy

  • External vulnerability testing from the internet perspective and internal security testing of your on-prem or cloud internal IT infrastructure 

  • You receive a jargon free report describing your security vulnerabilities and our recommendations

  • Your report includes specific technical details of root causes and remediation actions for your technical staff to implement

  • You can purchase this service on an ad-hoc or regular subscription basis 

Affordable Vulnerability Testing :

Preparation, Scanning
Reporting
Recommendations
Prioritisation of Risks
Remedial Actions
& Rescan
  • Penetration testing of infrastructure & web applications, ERP, mobile applications, industrial control systems, SCADA systems and more

  • Full spectrum penetration testing and Red Teaming capabilities – Information gathering, foot-printing, vulnerability assessment, exploitation, reporting and recommendations

  • Aligned with established standards and practices, combined with our extensive experience

Infrastructure Penetration Testing :

  • We use various security tools and methodologies e.g. WHOIS lookup, DNS queries, vulnerability scan fingerprinting, password guessing, directory traversals, file uploads, denial of service attacks, buffer overflow exploits, etc. to identify systems coding errors, missing patches, design flaws and misconfigurations

Web Application Penetration Testing

  • We identify remotely exploitable vulnerabilities and weaknesses in your web application that can be exploited by hackers to gain access to the sensitive data. We use effective methodologies e.g SQL injection, broken authentication & access control, cross-site scripting etc.

Penetration Testing :

Ethical Hacking
Reporting
Recommendations
Prioritisation of Risks
Remedial Actions
& Re-test

Our Clients

Contact Us

Tel : +44 (0) 020 8242 4756
Email:  enquiry@icyberdefence.com

iCyberDefence Limited

20 Eastbourne Terrace,

Paddington,

London W2 6LG, UK

©2018 by iCyberDefence, a brand registered under  iCyberDefence Limited, registered in England and Wales, 10980510

Registered Office: 27 Old Gloucester Street, London, WC1N 3AX