Red Team test
During a Red Team test, real, simulated attacks are performed against an entire company. Normally, a combination of pen tests and social engineering is used.
Find your security loophoples before adversaries do
Security testing
Today, security tests have become a hygiene factor in order to be able to provide secure services and meet the requirements facing businesses. As the biggest player in security testing in the Nordic region, we do not just identify and report gaps in an efficient manner, we can also provide recommendations for how to strengthen your security efforts over time
As Sweden's largest player in security testing, we can help you review everything from systems, networks, code and applications, to cloud environments and physical facilities.
To meet your needs, we provide both standardized approaches and custom remote access solutions, and are constantly developing our tools, methods and processes to meet the changing requirements of the security industry.
our services
During a Red Team test, real, simulated attacks are performed against an entire company. Normally, a combination of pen tests and social engineering is used.
During a penetration test or “pen test”, we test the resistance of everything from private systems to entire networks. We perform both external and internal pen tests.
During an application test, the resistance is tested in one or more applications, usually web or mobile applications.
During our cloud tests, we check the cloud platform’s (often AWS and Azure) architecture and technical security settings.
Code review is used to quickly detect gaps in development in order to minimise the risk of security breaches and simultaneously keep development costs down.
During social engineering tests, simulated attacks are performed to test employees’ resistance, which may involve methods such as phishing, baiting and physical breaches.
why sentor?
Having the most penetration testers in Sweden provides us with a high delivery capacity and the highest possible quality.
Our size and our strict recruiting requirements have allowed us to build unique groups of specialists within a host of different technical fields, e.g.Web, Windows/AD, Cloud etc.
We place a lot of value on being sensitive and making adjustments based on the unique needs of your organisation.
“We rely on Sentor to check our websites and applications. We are very satisfied with the work that Sentor has performed over the years and the feedback we received. Clearly a trustworthy security partner.”
We offer several contact routes and provide feedback as soon as possible. If you have sensitive information, we ask you to use the encrypted method.
+46 8 545 333 00
We answer 24/7
info@sentorsecurity.com
For general inquiries
soc@sentorsecurity.com
Use our PGP-key