Skip to content

Salus Cyber

Second
line of defence

Mobile

Confident communications

Limit risk, without limiting your workforce

Mobile devices are highly connected, often drawing data from numerous internal applications and databases.

They are essential for the connectivity of your workforce, but also a vulnerability for threats to exploit and gain access to your networks.

Salus Cyber helps customers to reduce the potential for attacks via mobile devices by limiting the number of entry points, highlighting any outdated APIs, reviewing frameworks and assessing any third party applications.

Mobile

MOBILE APPLICATION TESTING

Manual penetration testing of iOS and Android mobile applications for phones, tablets, laptops and other mobile devices.

MOBILE DEVICE TESTING

Far easier to lose or be stolen, mobile devices are an extension to your network perimeter and need securing.

MDM/EMM REVIEW

Our methodology reviews the settings enforced on devices by EMM/MDM and checks that they are applied as expected.

CODE REVIEW

We go in-depth into the application code to discover issues impractical to identify and exploit via standard testing.

More Second line of defence services

Cyber Aware

Learn more

Active Directory & IAM

Learn more

OC, ICS & SCADA

Learn more

Lost/Stolen Devices

Learn more

How we work

Customer Journey

  1. Identify

    First, we take time to familiarise ourselves with your business. This allows us to clearly understand your requirements, your business risks, your key pain-points, and the outcomes you’re looking for.

  2. Understand

    We turn those requirements into crystal-clear scoping and test plan documents, so you know precisely what we’ll be doing, when we will be doing it, and how we will do it.

  3. Test

    We deliver what we promised.
    Simple.

  4. Inform

    Every report we create is unique based on your business, we don’t use cookie cutter data for our summaries or our remediation plans. Our precise and concise findings brief will advise what steps your business needs to take next to reduce cyber risk.

  5. Remediate

    We can ensure that the remediation process is tracked and coordinated within your business, we will allocate resources to point you in the right directions or if you need our help directly with remediation, we’ve got you covered.

  6. Feedback

    Your opinion is important to us, so we send a questionnaire to every one of our customers after each project – so you can let us know how we did.

Request a call back