Silicon Sky can host several workshops to understand your IT objectives and infrastructure challenges. The requirements can be prioritised, and an agreed action plan is formulated to address your challenges.
An assessment consists of an in-depth analysis of your environment. The outcome of the assessment determines the recommendations for the future environment to meet business needs. An architectural design is provided to identify the future state benefits and the ability to move to a detailed design.
Design & Implementation
The design and implementation include a detailed micro-design of the technology proposed based on reference architectures. Implementation guidelines and risk mitigation are identified before delivery. Implementation consists of project management, system integration, full production implementation, training and support procedures.
Whether you are migrating to the cloud or migrating from physical to virtual, Silicon Sky has professional services teams that can assist in you along your journey.
Silicon Sky through a third party offers a vulnerability assessment that evaluates system and network security in order to identify possible vulnerabilities or areas of exploitation. This assessment can be done to fulfil a requirement for compliance or to test current security policies and procedures. Vulnerability assessments are designed to be non-intrusive with the VA results never tested or acted upon by the tester. The assessment can be delivered as an external scan towards public facing hosts or an internal scan to the client network, each with their own requirements and benefits.
Our Vulnerability Assessments are carried out by Security Experts kicking off with a pre assessment workshop to understand your requirements and environment followed by delivering a post assessment feedback workshop and Virtual Assessment report.
Penetration testing is an authorised attack on networks, systems or services by security engineers.
These attacks can be done with knowledge of the environment provided to the testing team by the client, called white box, or without any previous knowledge, called black box. The penetration test is usually centred on specific goals or targets, which would be tested against various attacks and reported upon to the system owner.
Our Penetration Tests are carried out by third party Security Experts kicking off with a pre assessment workshop to understand your requirements and environment followed by delivering a post assessment feedback workshop and Penetration report.
Our team of dedicated IT professionals can provide you with advice and assistance in a range of areas, from workshopping your IT objectives to assessments and design of your desired environment.