Sencode Ltd

Computer Security

Sencode Ltd

Victoria Rd, Victoria Building, Middlesbrough, Teesside, TS1 3BA  (Show me directions)

01642 7...Landline    Landline   

  Monday to Friday: 09:00 to 17:00, 09:00 to 17:30, 09:00 to 17:30, 09:00 to 17:30, 09:00 to 17:30, 09:00 to 17:30 , Saturday to Sunday: Closed  We are open Monday-Friday 09:00AM - 17:30PM. It's easiest to contact us through the contact form - https://sencode.co.uk/contact/

Email   

Website   

Profile

Security Beyond Compliance

Sencode is a multi-award-winning company with End-to-End ownership of everything we do. We pride ourselves on going the extra mile for our customers and working with them to ensure the best security.

Web Application Penetration Testing

What is it? A process of simulating an attack on a web application to identify vulnerabilities. We test to the OWASP standard of web application penetration testing.

What is the OWASP Top 10? The OWASP Top 10 is a list of the most common web application security risks: Injection, Broken Authentication, Sensitive Data Exposure, XML External Entities, Broken Access Control, Security Misconfiguration, Cross-Site Scripting (XSS), Insufficient Logging & Monitoring, Using Components with Known Vulnerabilities, and Insufficient Cryptographic Storage.

API Penetration Testing

What is it? A process of simulating an attack on an API to identify vulnerabilities. We test using industry standing API testing tools, to identify any of the common issues.

OWASP API Top 10 is a list of the most common API security risks: Broken Object Level Authorization, Broken Authentication, Excessive Data Exposure, Lack of Resources & Rate Limiting, Broken Function Level Authorization, Mass Assignment, Security Misconfiguration, Injection, Improper Assets Management, and Insufficient Logging & Monitoring.

Infrastructure Penetration Testing (External and Internal)

What is it? A process of simulating an attack on an organization's IT infrastructure to identify vulnerabilities.

We test to the PTES (Penetration Testing Execution Standard), which provides a structured approach to penetration testing. We also test to the NIST SP 800-115, which provides guidelines for conducting technical security testing of IT systems.

Media

Video 1

Report a problem with this listing