Cyber Security Assessment

An effective cyber security strategy has three domains: People, Processes and Technology. Its main aim is to find out the gaps or weaknesses among people, processes and technology and then suggest some effective controls in order to remove those gaps.


Providing the vast set of services in the vulnerability assessments and penetration-testing domain, our services include but are not limited to:

  • Network Vulnerability Assessments and Penetration Testing
  • Web Application Penetration Testing and Vulnerability Assessments
  • Mobile Application Testing
  • Source Code Review for Mobile and Web Applications
  • Mobile Application Vulnerability Assessments
  • Social Engineering Penetration Test

Our unique services consist of a largely manual approach focused on finding the most critical bugs which may not be exploited or found by the common automated scanners. Our Approach includes 65%-70% of the manual testing where the only crawling phase is conducted is conducted in an automated way. Manual testing eliminates affecting the production environment whereas automated tools can end up carrying out a Denial of service. Approach We conduct all our tests using three different approaches such as:

  • Black Box Testing
  • White Box Testing
  • Grey Box Testing

Mobile Application Security

Mobile Device Management Assessment

Many Organisations use Mobile Device Management (MDM) applications like Blackberry Enterprise Servers or may be a third party Device Management Server. Pyramid team helps you with MDM Assessment service by conducting a security assessment of the servers to identify unsuitable configurations or policies which are not in compliance with the organization security policy and best practices.

Application Source Code Review

Our Source Code Review helps to discover the underlying code issues which may not be detectable in the exposed user interface. Pyramid team can review source code for applications of different platforms like iOS, Android, Windows.

Key Features

  • Results on the technical assessments are prioritized according to the Common Vulnerability Scoring System (CVSS).
  • Our testing methodology is based on a combination of OWASP Mobile Top 10 and tailored customer requirements.
  • Our approach includes 65% to 70% of Manual Testing to provide deeper insights. Automated Testing is used for crawling phase.
  • Our reports does not contain any false positives

Web Application Security


Network Security Audit

Network Security Audit helps in finding out how well a particular part of the system complies to the standards set by the organization. Performing a network security audit is a good way to know where should we focus to ensure security. When and where users log on, access to the database, transfer of files is some of the items that are viewed in the network security audit.

What does a network security audit cover?
  • Our audit covers policies such as password requirements, if and how users can use their own devices on the network, privacy rules, and more.
  • Our security audit ensures that users understand best practices for accessing the network, including how to protect themselves from threats.
  • Ensure that the servers are working well, that the operating systems are current and that the physical hardware is in warranty.

The most important thing is that we ensure that we schedule regular audits and take action if we uncover problems.

Why is Network Security Audit necessary?
  • To find the flaw in the network
  • To protect the system from threats
  • To save the cost which would be incurred in resolving the system after an attack
  • IT issues management

DDoS Simulation

DDOS Simulation is a methodology in which a DDOS attack is executed on the system which is to be tested to check the robustness of the system if a DDOS attack were to happen. This simulated attack is performed in a controlled environment which doesn’t affect the production environment.

Our organization’s methodology for DDOS testing is designed in such a way that it proactively validates an organization’s DDOS defenses.

What all effects a DDOS attack can produce?

  • Slowing down websites or servers with false traffic
  • Sensitive data could be compromised
  • An attack on the web or network resources can interfere with a company’s business and have unexpected costs associated with it.
  • It affects the customer experience of an organization’s end users
  • Loss of reputation

How do we help?

We firstly understand that there multiple attack sources and methodology for sustaining an attack. The solution that we provide addresses both DOS and DDOS attacks because DDOS attack can take the form of a pure DOS attack sometimes. We patch all the machines on the network and monitor the traffic on the network to ensure that the systems are not compromised. The plan of action also includes understanding the various types of DDOS attacks.

Threat Intelligence

Threat Intelligence is the knowledge gained out of the information gathered from incidents or events which helps in identifying security threats and accordingly make decisions. It also helps in prioritizing threats and protecting the organization from the attacks that could do them the most damage.

Why is threat intelligence important?

Having a threat intelligence-led security program gives the organization a fighting chance to defeat the ever-changing threats. Not all threats are created equal and not all threats would have the same impact on an organization. It not only finds out the anomaly in the system but it can also help catch adversaries early in the attack lifecycle.

Which are the sources of Threat Intelligence?

  • Internal: It is composed of information and data gathered from the organization itself. By categorizing the event’s details, our team is able to observe patterns and similarities among the attacks.
  • External: It is composed of the information gathered from the outside environment. Open sources such as security researcher, vendor blogs, and private or commercial sources include threat intelligence feeds, structured data reports, unstructured data reports etc can provide us the required information.