Services

Centurion does not provide checkbox security services which often create a false sense of security, instead we provide comprehensive, high quality, value for money services to build trusted relationships with our clients.

The team of Centurions have a wide range of experience performing information security services for large multinational corporations and small-to-medium size businesses across different industries. Centurion provides services designed to meet your specific needs, and we invite you to explore a sample of our services.

Making your information security objectives a part of your organisation's strategy and aligning them with your business goals at an early stage of project lifecycle will allow you the most efficient protection of your information.




Penetration Testing

A penetration test exposes organisational weaknesses through techniques sometimes referred to as ethical hacking. This enables organisations to accurately determine the business and operational impacts of real world attacks and a successful compromise in a controlled environment.

Penetration Testing Services

Network Penetration Testing

Centurion identifies and examines vulnerabilities in your organisation’s external, Internet facing systems, and internal network to determine whether they can be circumvented or exploited to compromise targeted systems, or used to gain access to confidential information.

Network Penetration Testing

Applications

Whether your organisation develops web, mobile, or desktop applications in-house or works with third-parties, time constraints and a lack of awareness of secure software development practices, often results in an application with the potential to put your organisation’s information and systems at risk of compromise.

Application Penetration Testing

Wireless

A wireless penetration test will expose the weaknesses in your organisation's established wireless infrastructure and users’ mobile phones and wireless devices with privileged access to your organisation’s information.

Wireless Penetration Testing

Product Evaluation

Commercial off the shelf products and solutions can appear to be mysterious black boxes that provide little or no assurance to their security capabilities required to protect your organisation’s information. We provide your organisation with insight into the security capabilities of these black boxes through our penetration testing approach to evaluate the security of third party products and solutions.

Product Evaluation and Penetration Testing

Information Security Consulting

Finding a suitable candidate to fill the role of the CISO can be challenging due to the high caliber of necessary skills and experience required. In many cases, the best solution is to use an experienced third party consultant that understands the role of the CISO and has the support of a team of industry experts and resources to ensure you get the best information and advice.

Information Security Consulting

Infrastructure Security Services

Centurion offers a range of security services aimed at providing your organisation with the confidence and assurance that your IT infrastructure is not only capable of defending against real world attacks, but also aligned with industry best practices and vendor recommended security guidelines.

Infrastructure Security Services

Vulnerability Assessment

Vulnerability assessments will identify known vulnerabilities with the network, operating system, web application framework, and web servers through the use of automated scanning tools. The results can give you an overall picture of the vulnerabilities present on your network and assist in vulnerability risk management.

Vulnerability Assessment

Network Architecture Review

Centurion reviews your organisation's network architecture diagrams and relevant documentation, then conducts a discussion with key people to get a complete understanding of your network architecture.

Network Architecture Review

System and Device Hardening

Centurion will determine how well the your organisation’s systems and devices align with industry standards and vendor security guidelines, and how well it can defend your organisation’s information during a penetration test. System and device hardening reviews are intended to uncover vulnerabilities in configuration, unnecessary network services, the use of insecure technologies, vulnerable software versions, and weaknesses in protecting your organisation’s information.

System and Device Hardening