• +603 2711 9811
  • A-18-1 Northpoint Mid Valley City, Kuala Lumpur

Our Services

- - - - -
Penetration Testing

We do Penetration Test on On-Premise and Cloud Network (Desktops, Laptops, Servers, Devices, wifi), Web and Mobile applications. We follow ISO 27001 & CREST standards using Automated and Manual Tools & Scripts

Social Engineering Assessment

Our Social Engineering assessment test an organizations' employees and associated security policies covering multiple attack vectors like traditional email phishing campaigns, vishing (voice calls) engagements, USB Drop, on-site assessments and attempting access into the physical building.

Secure Code Review

Our Secure code review use combination of automated (SAST & DAST) and manual techniques to identify insecure code during development and testing phases which may end up as critical vulnerabilities once application goes Live.

Security Posture Assessment

Our Cybersecurity Posture Assessment provides internal and external security posture of an organization with remediation / mitigations for identified gap and provide recommendations with road map to achieve Secure state.

Dark Web Assessment

Our Dark Web Assessment hunts for the availability of sensitive, private, or potentially damaging information about an organization and related accounts, systems, and people in dark web marketplaces, forums, exchanges, open-source intelligence (OSINT) and known hot spots (Pastebin, Shodan).

CISO as a Service

Stay focused on your business while an experienced, cost-effective CISO from our best-in-class team take care of your security and compliance. Achieve a high level of security and compliance without the cost of a full-time, in-house CISO.

Compromise Assessment

Our Compromise assessment detects all known and unknown (zero day) variants of malware, remote access tools, lateral movements that have evaded your security defenses without relying on existing defense tools.

Red Team Assessment

Our Red Team assessment is a highly targeted engagement to simulate a genuine cyber-attack on an organization that aims to compromise critical data assets in the network, leveraging the vast scope an external attacker would have. Best suited for companies evaluating their existing defense technologies.

Strategy, Framework Consultation

We provide Cyber Security Strategy and Framework (Cyber Resilience, Technology Risk Management, Secure SDLC), Compliance, and policy consultations. Let our experienced strategists prepare and guide you to manage the known and the unknown threats.

Data Center Resilience Assessment

Our Data Center Resilience Assessment provides thorough evaluation of risks, as well as the expected performance of critical services that span data centers, colocation facilities and the cloud.

Threat Vulnerability & Risk Assessment (TVRA)

TVRA identifies security risk an organization faces and ensures that the physical security program is designed to properly address those risks. TVRA report provide gap analysis and recommend risk control strategies to mitigate identified security risks.

Security & Policy Consultation

Our Security and Compliance service covers validation services against compliance for People, Process and Technology. Our experienced team will assist you in compliance mapping as well as implementing compliance requirements.