× close Kiandra IT Logo Kiandra IT

Security

Our security specialists love the challenge of making it as difficult as possible for the bad guys to compromise your systems – from inside as well as the outside.

Specialist Security Services

Our experts use the same tools as the hackers (and some that are better!) to protect and test your systems and ensure they’re in the most hardened state possible.


Penetration Testing / Ethical Hacking

Our security team attack your organisation's network from a malicious hacker’s point of view, to uncover and assist you address security vulnerabilities or weaknesses within your environment.

Web App/Vulnerability Assessment

The security team audits your network or app to highlight any known weaknesses that need to be addressed.

Security Assessment

The security team audits your security policies and procedures to identify any weaknesses.

Wireless Leakage Analysis/Wireless Security Assessment

We analyse and hack your wireless network to assist you in securing your wireless networks from attack more efficiently.

Corporate Security Culture Assessment

Kiandra facilitates on-site or remote testing of your employees to analyse their security awareness and how they respond to non-technical attacks, such as social engineering methods.

Security Awareness Training

Kiandra facilitates on-site training of your employees to increase their security awareness and protect the information assets of your organisation. They are also educated on how to identify and respond to non-technical attacks, such as social engineering methods.

Methodology


Kiandra's penetration testing methodology is derived from the large number client engagements we have undertaken, and draws on industry best practices and methodologies such as:

  • PTES (Penetration Testing Execution Standard)
  • OSSTMM (Open Source Security Testing Methodology Manual)
  • OWASP (Open Web Application Security Project)
  • PTS (EC-Council Penetration Testing Standards and Methodology)
  • NIST (National Institute of Standards and Technology) (SP800-115)

Our methodology also utilises the same techniques and tactics in APT (Advanced Persistent Threat) type attacks and lifecycle.

Traditional Security Services


We also specialise in installing and configuring secure firewalls, networking and wireless networking solutions, hardened operating systems, intrusion detection and prevention capabilities, Internet filtering and monitoring, disaster recovery and business continuity solutions.

  • End-point security
  • Firewalls
  • Intrusion Prevention Systems
  • Web filtering and monitoring

Meet the team

We’ve hand-picked the best, brightest and loveliest people from the industry. They also happen to be awesome at IT.

Check us out

Let's talk about Security

Fill out the form below to organise a free consultation about your Security needs.