While we have a very technically focussed team, Insomnia understands the subtle differences in IT security testing that companies require, and believes the best service we offer is the flexibility with which we work with our customers to provide a service and report that fits their requirements.
Any of the IT security testing services listed below can be combined or tailored to your needs and if a service you require does not appear in the list we are able to assist in evaluating the requirement and sourcing a provider.
The following core services are currently offered by Insomnia Security:
Application Security Review
Commercial products are used throughout corporate networks, usually with little regard to how secure they are. Often it is thought that if a product is commercially developed then it must have undergone rigorous security testing.
Capability Driven Testing
Insomnia has designed and developed its CDT exercises to provide organisations with up-to-date, 'real world', highly effective attack simulations, with each exercise individually customisable for the organisation.
Client-Side Security Review
Penetration testing of client-side applications provides an appraisal of how an organisation's desktops, staff, and internal network would resist a targeted attack from a hostile source.
Host Hardening Review
Our team can perform configuration and deployment reviews on a wide range of operating systems and devices, to ensure they are configured and deployed in line with industry best standards.
Mobile Security Review
Insomnia Security has the capability to carry out mobile application reviews across a broad range of clients, as well as to perform security reviews of mobile devices and their configuration profiles.
Penetration testing simulates an attacker attempting to gain access to a specified target server or application. Testing involves the use of automated testing tools as well as manual test methods to review the security from an external or internal perspective.
Red Team Testing
Insomnia believes that each project requires a security review as part of the Security Development Lifecycle, but as well as securing each component you need to have an understanding of your current external security posture.
Source Code Review
In-depth review of applications at the source code level provides a greater level of security than a closed book approach. Often subtle vulnerabilities are missed during external penetration testing that can only be discovered through a secure code review.
The automated vulnerability scanning solution provided by Insomnia Security helps to ensure the security of your external facing network devices by providing timely and up to date vulnerability scans.
Wireless Security Review
Wireless security reviews involve not only testing Wireless Access Points, but include the entire wireless infrastructure - Access Points, enterprise controllers, backhaul networks, client systems as well as unauthorised access points on the wired network.