1.1 Security Service

General security assessment

In this service we provide the customer with a general review for the security status in the customer organization along with the recommendation to enhance or to set the security baseline with the most suitable level for the business

Web Applications Penetration Test

Foresight Security Professionals will find the holes and gaps that should be closed and provide the clients with a report describe each issue along with the recommendation to close and remediate .Foresight provide all the types of penetration testing: Black Box – Gray Box – White Box

Database Penetration Test

By adhering the database server to a full assessment to detect all the vulnerabilities this to figure out any security issue. Based on the database type our security professionals select the tools and the best practices, we work with a large amount of top enterprise database systems like: (Oracle, Microsoft SQL Server, Sybase, My SQL, DB2...etc.)

Network Devices & Firewall Penetration Test

Reviewing the network devices configuration starting from edge switches passing by the routers, VOIP Routers, access points, distribution switches, loud balancers, Proxies …etc. and end by the firewall is very important for all organizations to have the internal network and traffic secure.

Wireless Penetration Test

Securing every packet pass between the client wireless devices, detect and terminate the wireless attacks is one of our main objectives when provide our customers with wireless penetration testing service Securing the wireless network is a significant issue for any organization that has this type of infrastructure.

Security Awareness

Foresight professionals with their large experience with the hacking techniques and the hackers’ ways, they can deliver the best content for the customers’ employees. We have three categories of security awareness: IT – Management – Business users

Web Applications Vulnerability Assessment

Foresight Professionals are using the Best DAST (Dynamic Application Security Testing) tools to detect the vulnerabilities and report along with the recommendations to close

VOIP Penetration Test

Foresight Professionals with their large experience in establishing, configuring and securing VOIP infrastructure in many leading communications companies can help Foresight customers by reviewing the VOIP configuration and adhere the customers VOIP infrastructure to a full penetration testing to provide the client with the opportunity to get all gaps and holes that simulate risk on the organization VOIP infrastructure.

Servers Penetration Test

Each server need a specific type of assessment as per the type of this server (Web, DB, Email, Terminal …etc.) this assessment is differ from server to server So Foresight perform each server assessment as per the standards and the experts recommendation using the best tools that are recommended for this each type separately

Forensic investigation Service

In case of a computer hacking or computers crimes, we need to answer these questions: • Who is the criminal? • How the crime happened? and When? • Who was involved in this crime? • What was the vulnerability that the hacker exploied? • Is my company still vulnerable? Foresight experts can answer all the previous questions by implementing some professional methodology to nd the digital evidence by following the rules of forensic investigation process and the digital evidence examination process.

Data Center Security Assessment

Data center security assessment provide Foresight customers with a full view for the security status of the data center and how much the data center is aligned with the international standards.

Applications Code Review

Foresight provide Security training for the client developers team on “How to write secure code” to make sure that every code they write in the future will be secure.

Phishing Simulation

Hackers are using Social Engineering attacks to exploit the employees, the managers and the IT staff to get some useful information about the infrastructure and the business. Foresight can provide Phishing simulation and use it as a measurement for the employees security awareness level by implement twice and in between we can provide some security awareness sessions for the employees.

Servers Vulnerability Assessment

Finding the servers vulnerability and close immediately before the hackers exploit is one of the basic security controls to protect the data and the whole infrastructure. the main objective of Servers vulnerability assessment is to evaluate the security status, healthy status, prioritizing the vulnerabilities in the server and finally give the recommendation for each vulnerability in the final report.

1.2 Compliance Services

PCI DSS Compliance Service:

The payment card industry has been working over the past several years to formalize a standard for security practices that are required for organizations that process or handle payment card transactions. The fruit of this labor is the Payment Card Industry Data Security Standard. This standard, which started life as the Visa Digital Dozen, is a set of focused comprehensive controls for managing the risks surrounding payment card transactions, particularly over the Internet. Of course, compliance validation is one of the requirements.

GDPR Compliance Service

GDPR requirements are mandatory for any organization that is in the EU or providing services in the EU, if you are Data Controller or Data Process Foresight can help you to set the appropriate controls to protect your data subject's data. Foresight managed many GDPR compliance projects in many organization in EU and UK

ISO 27001 Compliance Service

Foresight Consultants have the ability to provide a model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an Information Security Management System (ISMS). The adoption of ISMS should be a strategic decision for an organization.The design and implementation of an organization ISMS is inuenced by their needs and objectives, security requirements, the processes employed and the size and structure of the organization.

1.3 Outsourcing Services

information Security Management implementation

Information Security Management implementation

Data Centers Designing Service

Data Centers Designing Service

Risk Management Service

Risk Management Service

System/Application Hardening Service

System/Application Hardening Service