Make Your IT Systems and
Information More Secure

Cybersecurity is a persistent and increasing business risk for organizations that depend on mobile endpoints that connect through networked and cloud-enabled platforms.

With solutions tailored to your specific needs, BlackBerry’s
cybersecurity consulting and tools will help you:


Identify the latest cybersecurity threats


Develop appropriate risk mitigation strategies


Implement and maintain IT security standards and techniques


Defend against the risk of future attacks

Penetration Testing

Penetration testing is the process of attempting to gain access to computer systems, networks, mobile devices, wireless communications and web applications, without knowledge of usernames, passwords or any other normal means of access. With permission from your organization to test, the ultimate goal is to find vulnerabilities that a hacker could exploit and tell you how to remove the vulnerability. 

Standard Types of Testing Available Include:

External Penetration Testing

to ensure that your Company’s IT systems are secure from any internet-based attack.

Internal Penetration Testing

to reveal any potential issues that may allow a server to be compromised by a user already on the internal network, including internal employees.

PCI DSS ASV Scanning

to scan infrastructure related to card payments.

Social Engineering

to identify environment and human vulnerabilities that can threaten your networks.

THINK Service

THINK (Threat Intelligence and Knowledge) service provides a unique and ‘real world’ approach to assessing the security of your organization. Cyber threats can come from any of a number of sources, but all have one advantage in common: time. To better simulate this reality, unlike a standard penetration test, a THINK test will typically occur over a period of time. This allows the testers to observe the targets and choose the most effective time for an attack, or attempt multiple low scale assaults to gain an understanding of the nature of protections in place. 

Cyber Essentials Plus

Are you a supplier to the Ministry of Defence or its Supply Chain?

From January 2016 the MoD will stipulate in all new contracts for MoD identifiable products and services that Cyber Essentials or Cyber Essentials PLUS is a requirement upon commencement of the contract.

Encription Limited is an authorised certification body under the QG Cyber Essentials accreditation scheme.

External Penetration Testing

to ensure that your Company’s IT systems are secure from any internet-based attack.

External Penetration Testing

to ensure that your Company’s IT systems are secure from any internet-based attack.

External

to ensure that your Company’s IT 

External

to ensure that your Company’s IT systems are secure from any internet-based attack.

Forensic Services

Unlock the potential of digital evidence. Today, crime often involves use of digital devices either directly or indirectly. A forensic examination of these devices can reveal important information that could strengthen a case.

Choose From a Range of Forensic Services Including:

Digital Forensic Investigations

on hard drives, removable media, digital cameras and smartphones.

Incident Response Support

to ensure that your Company’s IT systems are secure from any internet-based attack.

One-Day Onsite Forensic Readiness Consultation

to help you develop an incident response plan.

Damaged Drive Recovery

can help you avoid losing business critical data contained on hard disks.

IT Security Training

Learn how to protect your organization from potential threats with a wide range of professional IT security and forensics training courses.  These courses are delivered either on-site or in-house by active penetration testers. 

Get Started

Have a look at some of the tools and resources available, or get in touch with us to enquire further about the services available.

Test Resources

Have a look at some of the tools and resources available, or get in touch with us to enquire further about the services available.

Have a look at some of the tools and resources available, or get in touch with us to enquire further about the services available.Have a look at some of the tools and resources available, or get in touch with us to enquire further about the services available.

Learn how to protect your organization from potential threats with a wide range of professional IT security and forensics training courses.  These courses are delivered either on-site or in-house by active penetration testers. 

When we reviewed the BES platform, it armed us with the confidence we needed to retain a cross-platform choice for people. Choice is essential, but organizations need to ensure they have the back-end security in place, which BES provides.

Gary Pettigrove

Chief Information Officer, Australian National Audit Office

When we reviewed the BES platform, it armed us with the confidence we needed to retain a cross-platform choice for people. Choice is essential, but organizations need to ensure they have the back-end security in place, which BES provides.

Gary Pettigrove

Chief Information Officer, Australian National Audit Office