IDENTIFY YOUR VULNERABILITIES
BEFORE THEY BECOME LIABILITIES
Cyber threats have become increasingly dynamic and sophisticated, making static and isolated solutions inadequate for protecting businesses.
Aigeus Cyber's team of cyber security professionals adjusts rapidly to the ever changing exploits landscape, customizing our plan of attack to address specific attack vectors within your organization, identifying vulnerabilities, and providing actionable intelligence to mitigate risks.
You need to safeguard your business from cyber security threats and protect your valuable assets and sensitive data. Our approach empowers your business to identify its vulnerabilities before they become liabilities.
Improved Insurability
Insurance Premium Discounts
Bolstered Client Trust
Secured Intellectual Property
Advanced Data Security
Data Regulatory Compliance
From full-spec system penetration testing, to maintained threat management and data recovery plans, the Aigeus Suite of services ensures you are ahead of the risks your business faces.
-
System PenTesting
-
Threat Detection
-
Vulnerability Management
-
Direction & Training
-
Incident Response Plan
OUR STANDARDS
OWASP
The Open Web Application Security Project (OWASP) provides a comprehensive guide for conducting web application security testing, which can be applied to other types of applications as well.
NIST Cybersecurity Framework
The National Institute of Standards and Technology (NIST) Cybersecurity Framework provides a set of guidelines for managing cybersecurity risks, which can be used to inform our pentesting methodologies.
ACFE SA Pen Testing Standards
The Association of Certified Fraud Examiners (ACFE) South Africa has developed standards for digital forensic practitioners, which can be adapted for pentesting purposes.
Information Security Accreditations
Ensure that your team holds a wide range of information security accreditations, such as Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), and Certified Information Security Manager (CISM).
Standard Penetration Test and Dynamic Probe Super-Heavy Test
These are two commonly used penetration tests in South Africa, which can serve as a basis for your testing methodologies.