Our Approach

We do not provide checkbox security services which often create a false sense of security; instead we provide comprehensive, high quality, and value for money services to build trusted relationships with our clients. We apply a quality assurance process to ensure that each test meets our clients requirements in a secure and productive manner and provide quantified risk ratings (CVSS) with insightful reporting for both technical specialists and business representatives.

Secure By Design

Making your information security objectives a part of your organisation’s strategy and aligning them with your business goals at an early stage of project lifecycle will allow you the most efficient protection of your information.

Services

Cyber Security Advisory

Finding a suitable candidate to fill the role of the CISO can be challenging due to the high cali...

Application Penetration Testing

Whether your organisation develops web, mobile, or desktop applications in-house or works with th...

Network Architecture Review

Centurion reviews your organisation’s network architecture diagrams and relevant documentation, t...

Network Penetration Testing

Centurion identifies and examines vulnerabilities in your organisations external, Internet facing...

Product Evaluation

Commercial off the shelf products and solutions can appear to be mysterious black boxes that prov...

System and Device Hardening

Centurion will determine how well the your organisations systems and devices align with industry ...

Vulnerability Assessment

Vulnerability assessments will identify known vulnerabilities within the network, operating syste...

Wireless Penetration Testing

A wireless penetration test will expose the weaknesses in your organisation’s established wireles...