Each assessment performed by Ember Lake is tailored to fit your needs and specific to your organisation's industry and regulatory compliance requirements. Because of the overwhelming number of potential vulnerabilities that attackers leverage in their attacks, we categorise our assessments into three main pillars for easy identification. Each assessment produces a professional report detailing the scope, methodology, findings, proof of concepts and recommendations for remediation.
A simualted attack targeting your organisation to identify security vulnerabilities.
Red Team Assessments
An adversarial Penetration Test that pits your internal IT team (Blue Team) against our ethical hackers (Red Team) to test security controls and response procedures.
Dynamic Application Security Testing (DAST)
This assessment analyses web applications via their front-end to identify vulnerabilities through a series of simulated attacks. Got an API you want tested? Not a problem - this is included as part of the DAST assessment.
Social Engineering Assessments
Scenario-based attacks utilising “true to life” to test end users and overall cybersecurity awareness levels.
M365 & Azure Security Assessments
A review of configurations and settings within your M365 & Azure tenant to identify security risks.
Want to know more?
Contact us today to speak with one of our cyber professionals to see how Ember Lake can help.