A refreshing company to deal with in the post COVID world where poor customer service and tardy delivery seem to have become the norm. I could not be happier with the commitment and responsiveness of the Datavax team. From initial contact to execution of the penetration test and delivery of a certificate was as easy as it gets with constant updates on progress and an easy review process to iron out issues with the testing of the systems. We also had our AWS infrastructure deployments reviewed against AWS best practice by technical staff and again, the experience was awesome and we are really happy with the ongoing relationship we have with the Datavax team.CTO, uMed
We engaged Datavax to perform a pentest on our SaaS application. We found them to be very detailed, responsive and professional. I would have no hesitation in recommending themCo-Founder / CTO
As a digital health company data security is paramount for our business, therefore it was important to choose the right company for our penetration testing requirements. Datavax provided an excellent service from beginning to end, responding promptly to any queries and providing thorough testing, reporting and technical follow up.Chief Operating Officer
Working with the team at Datavax was a joy. From the outset they were warm, friendly and professional, and provided clear feedback and advice. Their testing was detailed and extensive, which gave us the confidence that our web system and apps are safe, and that our employees understand how to appropriately recognise and report potential security breachesChief Technology Officer
Datavax were very easy to deal with. All queries and requests were dealt with promptly in a pleasant and helpful manner. They were able to conduct the penetration test with a minimum of hassle and inconvenience. We found them efficient and effective and are happy to recommend themCredit Union Manager
I.T is of fundamental importance to Cootehill Credit union (CCU) and the biggest challenge is keeping it secure.
We chose Datavax for the accreditation of their staff, diversity of testing, their testing approach, and their willingness to be helpful and forthcoming with information on every occasion.
My role as an I.T consultant was to guide CCU towards a company which would deliver a comprehensive report on vulnerabilities. Datavax has fully met the requirements for which they were engaged. Cootehill Credit Union, IT Consultant
Who We Are
Datavax is a highly-qualified security partner that is only in the business of testing, reporting, and providing comprehensive guidance—not repairs. Why does that matter? It means we’re independent advisors with no hidden agenda, so you can trust our assessments.
Our testers are CREST-certified and leverage a Red Team approach to replicate real-world threats, challenging your information security strategy with tailored testing, every time.
Penetration testing is an essential service for all organisations, very much distinct from automated scanning tools, this type of testing aims to replicate a real-world hacker as closely as possible. Datavax’s realistic approach relies on manual testing methods and extensive knowledge and experience of the industry. This type of approach alongside a regular schedule of tests means even the most complex systems and information can be protected and secured from these types of threats.
Often confused with conducting a vulnerability scan or security assessment, penetration testing stands apart in a few critical ways.
1. Whilst regular scans and reviews can check for missing patches and security holes on the surface, a penetration test goes further. A penetration tester thinks like a real-world hacker, exploring multiple avenues of attack and replicating their approach and methods to obtain critical reporting insight, detail that a scanning tool would not be able to produce.
2. Penetration testers need to be experts in their field and have exposure to the latest tools and methodologies to be able to replicate a real-world threat effectively. To achieve this level of specialism, testers must be trained and certified to the highest standards in the industry, comparably the use of automated scanning tools does not require industry certification.
3. To be able to efficiently protect and secure your organisation and customers, you need to understand the path a potential threat could take and the overall impact it could have in order for you to make effective business decisions in the context of your information security strategy.
From start to finish, you’ll be paired with a dedicated Project Manager and Penetration Tester who will be on hand throughout the whole process should you need any support.
The process is relatively simple, we first discuss your current setup and the testing processes you have in place as well as the key motivators and considerations for getting tests completed. For example, if an employee recently fell victim to a fake email (Phishing Email) you may wish to conduct regular Social Engineering tests, such as Phishing Assessments to address the issue and ensure staff are well trained on the topic and associated reporting processes.
We then scope out final requirements and agree a project plan together, ensuring any party involved in the project is looped in and in agreement. Next, we carry out testing over the agreed period, highlighting any critical vulnerabilities we find in your infrastructure immediately. Once testing has been completed and the report has been compiled and shared, we are again on hand for any technical support you may require to digest the report and any advisories.
The final step in the process, is ensuring you’re confident in any actions you need to take in relation to the test results and best practice moving forward, sharing your website badges with you (to promote test completion) and most importantly, making sure you have been happy with the service.
Once you have approval from your organisation to carry out penetration tests, we will need to know what type of test you require, the scope of these tests (e.g. will we be testing head office and sub office’s infrastructure?), insight about your current infrastructure and setup (e.g. IP’s that will be tested) and details of any 3rd parties that need to be made aware of tests. Don’t worry if you’re not sure how to find this information though, as your dedicated project manager can help with this during your first call.
Datavax want to make information security accessible and effective for all, so to ensure we provide the most accurate and affordable price, we always ask for your specific requirements first. This typically happens on the first call with your project manager and tester, so we can ask any necessary questions to ensure we understand the requirements in detail.
The duration of a test can vary depending on a few factors, including the scope of each tests, the approach (manual Vs automated) and finally, the results. For example, if your penetration test does not identify any vulnerabilities, it will take less time overall than if we find multiple vulnerabilities that require exploitation for reporting. However we can provide clear lead times on your first call and and insight about the planned duration of the project, during kick off.
Datavax provide branded website badges indicating test completion, enabling your business to promote your information security to new and existing customers. We can also provide customer facing cover letters as proof that you have had tests completed. In some instances, our clients require a retest if vulnerabilities are found during initial tests, in order to obtain a Clean/Pass result.
Red Team (attackers) assessments are designed to test the capabilities of Blue Teams (defenders). Whereas a normal penetration test seeks to establish and test common exploitable vulnerabilities, Datavax used a Red Team approach to seek to replicate the behavior or to act in a bespoke manner similar to how a patient advanced attack or advanced persistent threat (APT) would.
By using this ethical hacking approach rather than purely scanning and automation tools, Datavax can be confident that testing replicates a real-world threat in a realistic way, as such in a Red Team approach. For example when performing Web Application Tests, Datavax testers assume a 75/25 split between manual ‘human’ testing and automated scanning tools.
Ransomware is a type of malware (software intentionally designed to cause damage) that is used to encrypt a person or company’s device and associated data. The attacker then demands a ransom in order to restore access to the device and data. Usually victims are given instructions for how to pay the ransom and obtain the decryption key to regain access and control. Once of the most recent and notable examples of a Ransomware attack was Ireland’s national healthcare provider, HSE.
Get a free consultation—with no obligation
A Datavax Project Manager can help you identify and understand your security needs, so you can protect your customers and help your business thrive.
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Cookie
Duration
Description
cookielawinfo-checkbox-analytics
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional
11 months
The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy
11 months
The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.