Security Services

Cyber Security Assessments & Audits Services

IT infrastructure plays a vital role in every organization no matter what the size. However, if your organization does not properly assess and secure its infrastructure and critical assets, adversaries can compromise them, damage your business, and steal data. As attackers become more clever, stealthier, and their attacks more complex, it is imperative to regularly test your infrastructure, processes, and employees.

Hacker Compromising a Machine

We live and breathe cyber security! For this reason, we have designed a security assessment and audit portfolio that protects your organization and can be tailored to your needs. Our extensive experience and passion ensures the maximum protection for your business.

Our security assessment and penetration tests include comprehensive reports about vulnerabilities and weaknesses which have been identified and exploited during the engagement period. The most value comes from aggregating the discovered vulnerabilities to support prioritized remediation efforts, while allowing strategic conclusions.

Elite Cyber Security Analysts

Our security audits and penetration testing services rely on highly skilled security professionals and penetration testers, with experience in both defense and offense, while holding the most recognized certifications in the industry.

Having worked on hundreds of security assessments, penetration tests, incident responses, and breach root cause analysis for companies in various sectors, wizlynx group is the perfect partner to rely on and ensure vulnerabilities are being discovered before cybercriminals do.

Wizlynx group Cyber Security Assessment Services Elite Team

Our Security Assessment & Audit Portfolio

Penetration Testing

Comprehensive penetration test of your IT infrastructure, web and mobile applications that may be used to store and access critical business information. Our penetration testers will use advanced skills and techniques required to identify and exploit vulnerabilities on your systems, services and applications
more info

Threat Intelligence-led Red Teaming Services

By following different approaches from a typical security assessment, our Threat Intelligence-based Ethical Red Teaming Services relies heavily on well-defined tactics, techniques, and procedures (TTPs), which are of the utmost importance to successfully emulate realistic threats or adversaries. Our Intelligence-led Red Teaming Services will allow you to successfully assess and measure the effectiveness of the people, processes, and technology used to defend your IT environment.
more info

Internet of Things (IoT) Security Assessment

Deep dive security assessment executed by our cyber security specialists which will check your IoT devices, from all angles, against OWASP Top 10 IoT Vulnerabilities and other industry security best practices. The assessment will mostly cover, but not limited to, communication channels and protocols, encryption and cryptography use, web, cloud, and mobile interfaces, APIs, firmware, hardware, etc.
more info

Social Engineering Assessment

Evaluation of your employees’ readiness to identify and withstand attacks through Social Engineering techniques. In our assessment, we use the same techniques as cybercriminals do (e.g. advance reconnaissance, phishing, vphishing, etc.) to launch realistic social engineering campaigns.
more info

Industrial Control Systems (ICS) Security Assessment

In-depth, but minimally invasive review of your Industrial Control Systems (ICS) / Operational Technology (OT) environment against ICS best practice frameworks, such as NIST Guide to Industrial Control Systems (ICS) Security Rev 2. This assessment will allow you to identify and understand your weaknesses and vulnerabilities affecting your ICS environment and establish an achievable plan to improve your cyber security posture.
more info

Secure Code Review

Examination of your web application's code performed by security specialists that aims to identify security flaws and withstand attacks. Analyzing the code gives the opportunity to find vulnerabilities that would not be found otherwise. Thus, this service is complementary with penetration test.
more info

Compromise Assessment

Extensive review conducted by our threat hunters of your environment to identify the presence of artefacts that could indicate the ongoing or past presence of an attacker in your network.
more info

Vulnerability Assessment

Discover vulnerabilities within your assets wherever they may exist (perimeter, internal networks, cloud). Regardless of the infrastructure in use, our experts will assess the security of your systems using both automatic and analytical (manual) methodologies.
more info

Firewall Review

Thorough verification of your perimeter and internal firewalls against security best practices by leveraging advanced manual and automated techniques. Our security experts will attempt to identify vulnerabilities and weaknesses in the architecture, firewall’s operating system configuration, security and NAT rule-set.
more info

What Will You Get?

All findings will be documented in a final report, and then compared with a strengths/weaknesses profile against international standards for IT & Cyber Security. The identified weaknesses will be assessed and supplemented with recommendations and remediation actions, as well as prioritized according to the risk associated. The final report will be discussed during a presentation with you. The report will include a comprehensive and meaningful C-level summary of the executed security audit or penetration test. Additionally, it will include all detailed results with respective evidence and recommendations for future security measures

wizlynx group Security Assessment Report

Our Most Recent Security Assessments & Audits

Electrical & Electronic Manufacturing
2020

IoT Security Assessment covering the entire ecosystem of connected door locks and cameras. The assessment included the firmware, wireless, network and physical security review of the IoT devices, Mobile and Web App Penetration Testing of customer apps and web portal, and a network penetration test of hubs and gateways


Airline Company
2020

Mobile Application Penetration Test of an inflight and online shop as well as a performance tracking app which allows users to track real time sales performances against their set goals


Multinational Insurance Firm
2020

Greybox Web App Penetration Test combined with a Secure Code Review for an app allowing agents to purchase insurance packages


Asset Management Firm
2020

Breach-Assumed Red Teaming engagement composed of two scenarios. The first scenario consisted in emulating an authenticated attacker with physical access to the customer’s office premise such as a staff employed by cleaning company. The second scenario consisted in mimicking an attack, as a low-privileged domain user with access to the customer’s network. Given the two scenarios, the objective was to identify if an attacker could penetrate our customer’s defenses and gain unauthorized access to organization’s Domain Controller within the given timeframe.


Healthcare Company
2020

External Greybox Web Application Penetration Test for one Conference Management System and WeChat mini program


For the full list of wizlynx group’s engagements, please visit our website at: https://www.wizlynxgroup.com/ch/en/cyber-security-switzerland/penetration-test-references

Our Security & Penetration Testing Certifications

wizlynx's security consultants and penetration testers hold the most recognised certifications in cyber security and penetration testing industry such as: CREST CRT, SANS/GIAC GXPN, GPEN, GWAPT, GCIH, GMOB, OSCP, CEH, CISSP, CISA and more!

Penetration Test | Offensive Security Certified Professional | OSCP
Penetration Test | GIAC Certified Penetration Tester | GPEN
Information Security | GIAC Expert Researcher and Advanced Penetration Tester | GXPN
Penetration Test | CREST Certified Penetration Tester | CREST
Penetration Test | GIAC Web App Pen Tester | GWAPT
Penetration Test | GIAC Mobile Device Security Analyst | GMOB
Penetration Test | Offensive Security Certified Expert | OSCE
Top