Security Design and Configuration Review


When it comes to addressing and responding to security threats and business impact, reliable and thorough information is critical. Therefore; when undertaking a security review or obtaining security related advice you want people who will find the security weaknesses and vulnerabilities – not people who will run tools or only follow checklists to find what is already known.

Securus Global SGValidate™ Technical Security Assessments provides maximium identification of security vulnerabiilties in the design, development, code or underlying infrastructure that can compromise the confidentiality, integrity and availability of your business and systems.  

Whether new technology, hardware, software, application or critical infrastructure, Securus Global can provide you with a thorough review or advice in how to progress forward with a more robust security design. Much of what we test are bespoke reviews covering more than one component for security testing, a variety of platforms and technologies or innovative new technologies. If you have a complex or unique requirement we can also tailor a solution that covers specific requirements and constraints.

Examples of security risk assessments commonly undertaken include:

  • Design reviews
  • Mobile device applications.
  • Wireless security reviews.
  • Corporate network and B2B connectivity security reviews.
  • Virtualisation security reviews.
  • Host security reviews.
  • Scada systems security reviews.
  • Source code review.
  • Database security reviews.
  • ERP and CRM systems.
  • VOIP, PBX/PABX security risk assessments.