Consistent processes

Methodology

Whilst every pentest varies due to the scope and nature of the systems involved, penetration testing will follow our custom developed methodologies and checklists which have been designed to exceed recognised industry standards such as NIST, OSSTMM, OWASP and PTES.

Whilst using a checklist provides comprehensive coverage, we are conscious that penetration testing is an iterative process. Therefore the consultant's experience and intuition is vital in identifying more complex vulnerabilities. This is where RM Information Security's human approach to technology is most evident.

Methodologies are available for our key penetration testing services:

How we work

FOLLOW US

ADDRESS
Peter House
Oxford Street
Manchester
M1 5AN

© RM Information Security Limited 2017.
All rights reserved.

CONTACT
Email: info@rminfosec.co.uk
Phone: +44 (0) 161 209 3939