Approach
What to expect working with us:
-
Step 1
Scoping
We start with a scoping meeting to gather your requirements and deliver a statement of work. You'll review it and sign it off.
-
Step 2
Pre-engagement
We'll confirm timelines and resourcing with you, launch into a kick-off meeting and gather any project requirements.
-
Step 3
Delivery
We deliver a report which meets the objectives and scope as defined in the statement of work.
-
Step 4
Post-engagement
We have a post-engagement wrap-up and complete any remedial assessments if required. We'll also ask you to provide feedback on our services so we can continue to improve.
We provide a wide range of cyber security consulting services to the NZ market and beyond.
Penetration Testing
Our expert team assesses your system's vulnerabilities through rigorous testing to identify and address potential security weaknesses.
Certification & Accreditation
We help you certify and accredit your systems and processes
Governance, Risk & Compliance
We help you establish effective governance strategies, mitigate risks, and ensure compliance with industry standards and regulations to protect your digital assets.
Payment Card Industry (PCI)
Our experienced consultants include Qualified Security Assessors (QSAs), who can assist you with your PCI audit scoping, gap analysis, tabletop exercises Self-Assessment Questionnaire, or identifying any changes between PCI DSS versions that might impact you.
Digital Forensics & Incident Response
We can support your organisation with the containment, preservation, investigation, remediation and recovery efforts required to get you operational after a security incident.
Managed EDR
Protect your organisation with world-class turnkey cyber security services.
Design, Build & Architecture
Our security architects will assist your organisation in designing and building secure solutions.
Cyber Threat Intelligence
Our Cyber Threat Intelligence Software as a Service enhances your organisation's defences by blocking network traffic matching known bad URLs, domain names and IP addresses.
Cloud Security
Our cloud security team will give you a clear picture of your security posture in the cloud.
Training
We offer training to empower your staff with the knowledge and skills needed to enhance your organisation's overall cyber security posture.