Cyber Security

Fancy a free vulnerability scan or an architecture workshop (Yes, we’re actually doing this!). Get in touch below!

Take your pick from two of our fantastic services, work with us, see what we can offer!

Take the Red Pill or the Blue Pill?

Scan my assets

We'll run an OSINT (Open Source Intelligence) Exercise and we'll aim our licensed vulnerability scanning platforms at your Internet facing assets. We'll then do a debrief report/run through of any guidance and advice. Free of charge, no catches.

Security Architecture Workshop

A half day workshop with our founder or a senior architect. We'll run through what we see in the security space and provide bespoke guidance to you and your team. We deliver this to small and large companies, none technical and highly technical audiences. We deliver a lot of value and learning in this workshop.

“The vulnerability scanning and OSINT scan carried out by Factory Internet have been invaluable in managing our external attack surface. The results from the scanning were detailed and influenced decisions in managing the risks associated with our public exposure.” – Security Lead, UK National Charity

Fill in our form and we’ll be in touch!!

Get in touch and let us help
Your Details

Please give us some contact details, our team - a Service Delivery Lead and an Architect/Security Engineer will be in touch within 24 hours.

First Name
Last Name
Company Name
Email
Phone
Which offer are you the most interested in?

Cyber Security Services

SOC Services

We run our own in-house 24/7 SOC Service. We ingest data from Cloud, On-Premise, Endpoint and provide not only an MDR Service, but a full SOC service.

Pen Testing

We offer pen-testing services and have partnerships in place to deliver Red Teams to simulate APT level activity. We can ethically attack networks, infrastructure, cloud services as well as applications.

Bespoke Threat Intel

We run our own collectors to bring in a variety of OSINT and Threat Intel to help assist in understanding current threats and attack methods.

Advisory Services

Our consulting and advisory services offer CSO/CISO advisory, architectural advisory and proof of concept services. Our security team are formed from our Tailored Operations team who actively build and design secure systems, as such, our teams have practical experience of building best in class security.

Problems we solve

Reducing risk by making security a known quantity
Reduce Risk
Factory help you assess risk in a way that works for both business and technology teams.
Avoiding Ransomware
Ransomware
Ransomware can be really dangerous, there are however a number of things to do which can allow you to easily avoid it.
Understanding data loss protection
DLP Monitoring
We can help setup, maintain and monitor your DLP technology to ensure it's meeting business and legal regulations.
What services do I have online?
Internet Monitoring
How do you know how many services you have online? Where does your name, domain or company name show up?
Knowing domains and certificates are valid
Domain and Certificate Checks
Having assurance that your internet domains and certificates match your genuine certificates and alert on changes to DNS serials and individual DNS record changes or resolution changes.
Compliance with regulatory standards
Standards Compliance
We can help you achieve the standards required to operate your business.
Security Testing
Pentests
We can evaluate your cloud, on-premise or hosted environments. We operate a series of commercial tooling, open source tooling and in house tooling against your systems and services to evaluate real world security of your systems.
Architectural Guidance
Design Authority
Assistance for your IT Teams to guide them to build secure platforms and services. Our design process looks at not only the implementation, but also the operational design of your systems.