Exhibitor Products

Loading
RevBits Privileged Access Management
A comprehensive access management solution that includes: privileged access management; privileged session management; password management; service account management; key management and certificate m …
Tanium Endpoint Security & Risk Management
Typical solutions for endpoint security require various tools and databases, meaning lots of manual reconciliation. By bringing all essential asset data together into one console, Tanium’s solution pr …
AttackTree Software

AttackTree Software

08 Jul 2022 Rachel Evans
Model system vulnerability, identify weakspots and improve security using threat analysis and attack trees. Construct graphical representations of measures designed to reduce the consequences of a suc …
Network Device Security Review
Assess the critical network devices that make up your corporate network looking for software and configuration vulnerabilities.
VPN Configuration Assessment
Assess the security configuration of your VPN to ensure a misconfiguration or vulnerability is not allowing external access to your corporate network.
Microsoft Cloud Readiness Assessment
Let Pentest People review your cloud security posture through a consultant-led audit service.
Phishing Email Assessment
Let Pentest People perform an email phishing campaign in either a broad scale or targeted based attack.
Social Engineering
Let Pentest People research, develop and manage a social engineering assessment of the security of your people and processes utlising the latest techniques. 
Zero Day Response Service
Let Pentest People scan your assets for 0-day vulnerabilities and let you know if you’re at potential risk.
Firewall Ruleset Review
Assess your Firewall Rule Configuration looking for security issues and unnecessary rules that could lead to a breach of your network.
272 Results