What we do
Security for your company
We provide security planning and code reviews for startups and small/medium businesses. Whether it’s just an idea, a single application, or a complete service, we can point out the risks and show how to be proactive about them in the future.Good security does not require purchasing complex software, or expensive services. Simple changes and proper configuration of existing features can have a dramatic impact on the overall security of your product. Effective defence starts with understanding your existing risks.
How do I know it’s secure?
We’ll review your current tools, application code, deployment description, design documents, and disaster recovery plans. We’ll help you find common issues, highlight the present risks, and understand how to avoid them in the future. If possible, we’ll help you automatically prevent those issues from coming back in the future.
We can help you answer questions such as:
- My service works, but is it secure?
- Can I improve anything without a big redesign?
- Can I get more out of my current tools?
Having the right plan can save your company
Trying to retrofit good security into the project after all the features are in place is not an easy task. It’s much easier to include the security features in the plan from the start. We’ll assist you in planning future work. We’ll help you prioritise which approach makes the biggest impact.
It doesn’t matter if your sevice uses your own hardware, autoscaling VMs, or containers, whether it’s a custom low level binary, or a Rails application. You’ll have to make decisions which will decide in the long run how easy it is to get access to your confidential data.
Finally, for the worst case scenarios, we’ll help you prepare the incident response plan. This will allow you to save time and be confident that nothing will bemissed in a stressful situation.
You don’t need complex software
You don’t need to start your security improvement by investing in complex technologies. The applications frameworks, the service layer they’re running on, and the operating systems all have a large number of options that can be tweaked. By knowing how to use them efficiently in your service, you can make serious improvements to your security.
Once the basic configuration is in place, we’ll show you how to use simple tools you already have to make big impact changes. Such as:
- How even the standard Linux firewall implementation can remove whole classes of issues.
- How to effectively use the privilege separation provided by your operating system.
- How to use the service design to mitigate vulnerabilities which are still present.
Send us your enquiry.