Infrastructure Security Services

Centurion offers a range of security services aimed at providing your organisation with the confidence and assurance that your IT infrastructure is not only capable of defending against real world attacks, but also aligned with industry best practices and vendor recommended security guidelines.

Our Approach

Creating a secure IT infrastructure requires access to highly specialised knowledge of a wide range of technologies and experience simulating advanced attacks against organisations. With this knowledge Centurion can help your organisation implement a strategic defense to protect its critical information.

Centurion offers a wide range of infrastructure security services designed to meet your specific needs, and we invite you to explore a sample of our infrastructure security services.

Vulnerability Assessment

Vulnerability assessments will identify known vulnerabilities with the network, operating system, web application framework, and web servers through the use of automated scanning tools. The results can give you an overall picture of the vulnerabilities present on your network and assist in vulnerability risk management.

Vulnerability Assessment

Network Architecture Review

Centurion reviews your organisation's network architecture diagrams and relevant documentation, then conducts a discussion with key people to get a complete understanding of your network architecture.

Network Architecture Review

System and Device Hardening

Centurion will determine how well the your organisation’s systems and devices align with industry standards and vendor security guidelines, and how well it can defend your organisation’s information during a penetration test. System and device hardening reviews are intended to uncover vulnerabilities in configuration, unnecessary network services, the use of insecure technologies, vulnerable software versions, and weaknesses in protecting your organisation’s information.

System and Device Hardening