SERAPH CYBER SECURITY
Internal Network Vulnerability Assessment
The internal vulnerability assessment assumes that an attacker is already inside the network, therefore this will highlight weaknesses on the internal network and attached devices.
An assessment will identify and analyze the security vulnerabilities that might exist in your organization.
Third Party Risk Assessments
We will assess and report on your third party’s security posture to determine the security risks they are exposing your business to.
Policies and Procedures
We will develop cyber security policies and procedures for your organisation that provides a roadmap for day-to-day operations.
This includes a manual review of the firewall configuration and rules to ensure they align to the manufacturer’s best practices and your company’s requirements.
Security Controls Assessment
This assessment will compare existing cybersecurity management practices and controls against, those recommended by the CIS Critical Security Controls –Version 7.1. The gaps identified will be risk assessed to assist your company in prioritising the remediation thereof.
External Network Penetration Test
The goal of the external vulnerability assessment is to identify weaknesses in the network’s perimeter defences. The scope of this test includes the external IP addresses of you public facing infrastructure.
Web Application Penetration Test
We will simulate real world cyber-attacks against your internet facing applications to identify where a hacker may penetrate.
Wireless Penetration Test
This test aims to identify vulnerabilities and their exploitability in your wireless network.
Cyber Security Awareness Training and Phishing
We offer a cyber security awareness training product which includes a phishing tool. The phishing tool will enable you to simulate a phishing attempt and measure the effectiveness of your trainingbased on who in your organisation was tricked by the phishing email. We will assist you in setting up your first training campaignand phishing attempt.
We specialize in providing clients with cyber security assessment services that identify risks and pragmatic measures to mitigate them.
Seraph Cyber Security, a level 1 B-BBEE contributor, was established in 2017 to help clients understand their cyber security risks and how to address them most effectively. It also aims to meet the ever-increasing demand for specialist cyber security skills by employing and growing local talent.
Seraph is the name of a fictitious character from The Matrix Trilogy. He is described as the personification of a sophisticated authentication protocol which guards the Oracle. After meeting the protagonist, Neo, Seraph explains his purpose, “I protect that which matters most”. Similarly we aim to assist clients in protecting what matters most to them, their information.
Meet the Team
Cyber Security Analyst
Cyber Security Analyst