
145-157 St. John Street, London, EC1V 4PW (Show me directions) Show Map
Monday to Friday: 09:00 to 17:30 , Saturday to Sunday: Closed
Amex, Cash, Cheque, Mastercard, Visa
Profile
Welcome
Security Audit Systems offer external independent security website penetration testing services. Based in the UK, London and the South West, we have a portfolio of international clients, varying from small to medium sized companies to multinationals operating in countries such as the USA, UK, France, Germany, Switzerland, Italy, India, Russia and China. Businesses across the world come to us to have their websites and web facing networking equipment tested against the latest security vulnerabilities.
About Us
Security Audit Systems is a highly driven security consultancy with a keen interest in all aspects of the IT security sector. Each member of our team is a skilled penetration testing consultant, who will provide your business with an in-depth security vulnerability assessment of your systems. Providing accurate information that helps businesses secure their online presence is our objective, and at the same time fundamentally helping the internet become a more secure communications platform for us all.
How does it work?
There are essentially two main types of penetration tests, blackbox penetration testing often called external penetration testing, or whitebox penetration testing, often called internal penetration testing. Blackbox pen testing audits the target from an outsiders perspective, with no prior knowledge of the system, and are generally the most preferred type of test. Whitebox pen testing looks at the target host with insider knowledge, meaning an account/user access privilege would be handed to the pen tester, to see what information they could obtain. Often this is done in order to test account access controls, or to see if any flaws exist which would allow a potential privilege escalation. The tests work within a set framework, generally consisting of four broad phases, network enumeration, vulnerability assessments, exploitation and finally reporting and remediation. Network enumeration aims to pulls as much information about the network as possible using a variety of information gathering tools and techniques. Vulnerability assessments search the information obtained for known flaws and weaknesses, which are then validated where possible using exploits. The final stage and often the most time consuming is the report writing, when all the information obtained is put together in an easily understandable report for the client to read.
Reviews
Leave a reviewReport a problem with this listing
Offers from our Partners
Start your business with Tide
Register your limited company and open a business account all in one go, for FREE! Tide pay the £12 incorporation fee on your behalf, and to get you off to the best start you'll get £75 in your new account on us!
Grow your business online
Access a full range of digital services and promote your business online. Whether you have an existing website and want to grow it online, or you want to start from scratch, our full digital store is ready for you and we have a team of experts on standby to help your online dreams come true!

Get a fabulous new logo
Use our fabulous new logo builder
FREE Business Phone Number
Look professional with a Business Number from Cleartone.
Want an instant online presence?
Need an instant online presence for you, a product, a business? Webcard gets you online instantly - no code required. Edit 24/7 and share instantly with our powerful app.