Information Security Services

Penetration Testing

A penetration test is a proactive and authorized attempt to evaluate the security of an IT infrastructure by safely attempting to exploit system vulnerabilities, including OS, service and application flaws, improper configurations, and even risky end-user behavior. Such assessments are also useful in validating the efficacy of defensive mechanisms, as well as end-users’ adherence to security policies.
Penetration tests are typically performed using manual or automated technologies to systematically compromise servers, endpoints, web applications, wireless networks, network devices, mobile devices and other potential points of exposure. Once vulnerabilities have been successfully exploited on a particular system, testers may attempt to use the compromised system to launch subsequent exploits at other internal resources, specifically by trying to incrementally achieve higher levels of security clearance and deeper access to electronic assets and information via privilege escalation.
Information about any security vulnerabilities successfully exploited through penetration testing is typically aggregated and presented to IT and network systems managers to help those professionals make strategic conclusions and prioritize related remediation efforts. The fundamental purpose of penetration testing is to measure the feasibility of systems or end-user compromise and evaluate any related consequences such incidents may have on the involved resources or operations.

Intelligently Manage Vulnerabilities

Penetration testing provides detailed information on actual, exploitable security threats. By performing a penetration test, you can proactively identify which vulnerabilities are most critical, which are less significant, and which are false positives. This allows your organization to more intelligently prioritize remediation, apply needed security patches and allocate security resources more efficiently to ensure that they are available when and where they are needed most.

Avoid The Cost Of Network Downtime

Recovering from a security breach can cost an organization millions of dollars related to IT remediation efforts, customer protection and retention programs, legal activities, discouraged business partners, lowered employee productivity and reduced revenue. Penetration testing helps you to avoid these financial pitfalls by proactively identifying and addressing risks before attacks or security breaches occur.

Meet Regulatory Requirements And Avoid Fines

Penetration testing helps organizations address the general auditing/compliance aspects of regulations such as GLBA, HIPAA and Sarbanes-Oxley, and specifically addresses testing requirements documented in the PCI-DSS and federal FISMA/NIST mandates. The detailed reports that penetration tests generate can help organizations avoid significant fines for non-compliance and allow them to illustrate ongoing due diligence in to assessors by maintaining required security controls to auditors.

Preserve Corporate Image And Customer Loyalty

Even a single incident of compromised customer data can be costly in terms of both negatively affecting sales and tarnishing an organization’s public image. With customer retention costs higher than ever, no one wants to lose the loyal users that they’ve worked hard to earn, and data breaches are likely to turn off new clients. Penetration testing helps you avoid data incidents that put your organization’s reputation and trustworthiness at stake.

Configuration Review

configuration reviews help ensure that corporate system builds for servers, workstations, laptops, and other network infrastructure are configured securely and in line with security best practices and standards. It is important to have robust and secure standardized builds that are consistently deployed, as this provides assurance that business-critical systems are protected from both a network and a local perspective.

Our consultants are able to review the security configuration of different types of systems, servers and devices. We will provide a detailed report that includes the risks to your business and recommendations for remedial actions. This helps to ensure that your IT assets are aligned to the latest industry and vendor guidance and thus hardened against attack.

Desktop and server builds

We can carry out desktop and server build reviews to rectify flaws in an organization’s processes that could be contributing to security problems. Context has a range of experience in reviewing the configuration of desktop and server builds against industry good practices and vendor guidelines.

Application servers

We are able to review the configuration of a wide range of application servers, including common web servers, database servers, application servers and virtualization technologies, as well as their underlying operating systems.

Firewalls and network devices

Many organizations have come to rely on firewalls and network devices as a keystone of their defenses, so it is important to ensure that they are fit for purpose. We have a tried-and-tested methodology for reviewing the configuration and rules of firewalls and network devices such as switches, load balancers, and security appliances. We review devices from mainstream vendors such as Cisco, Check Point, F5, Juniper, Blue Coat and Palo Alto. Our testing is designed to identify security vulnerabilities, such as failure to achieve best practice, or instances of incorrect firewall configuration and the scope of each review can be adjusted to suit individual circumstances.

Mobile Devices

Mobile devices are increasingly used by employees within organizations to access sensitive enterprise data so it is vital that these devices are secure. This can be achieved by having a robust Mobile Device Management (MDM) solution to manage all devices that have access to enterprise resources. Context can perform security reviews to assess your deployed MDM solution configuration, the supporting network architecture, as well as the mobile device security policies and management processes.

We can also test your mobile devices to verify that the deployed policy and configuration options provide the expected security. This provides assurance that corporate MDM systems and BYOD set-ups are secure and that risks relating to lost or stolen devices and data are mitigated.

Policy & Procedures Development

Security miter, will review, revise, modify and document existing information security policies and procedures, and draft additional policies and procedures as necessary to enhance and organize our clients’ written policies and procedures utilizing a three-tiered compliance model.


The Information Security Policy, approved by the Board of Directors, is the compliance-oriented document that provides the strategic direction for your institution and delegates to management the responsibility and authority to implement the Information Security Program.


The Standards document will define the principles, values and environment. Standards also define the authorized use of information and compliance requirements. Procedures specify step-by-step directions for compliance with standards.


Employee Guidelines consist of those elements of the institution’s standards and procedures that affect every employee and are augmented with the institution’s appropriate use standards. The Employee Guidelines do not contain elements of the standards and procedures that are designed for management and IT staff. The Employee Guidelines provide a guide for meeting mandated training requirements.


Throughout the term of the contract, security miter will modify the institution’s policy and procedure as necessary to keep pace with changes in law or regulation, changes in technology, changes in management and/or changes in operations that may impact the institution’s Information Security Policies and Procedures.