New DataLocker Sentry available, FIPS 140-2 certified
Cisco Releases Security Updates
NCSC Releases Security Advisory
Apple Releases Security Update for macOS High Sierra
  If you would like to discuss any aspect of network security you can reach us at
  We are looking forward to hearing from you. You can also contact us at



Special pricing for one off Vulnerability scans using Qualys Consultant license, charged 1 scan for 1 IP address, external internet-facing or internal secure systems using an appliance. Reports prepared outlining vulnerability, risk and remediation advice including patch, hotfix and configuration procedures.

For the most comprehensive Vulnerability status available

Call for pricing


Day Zero Security provides vulnerability and penetration test services to allow clients to secure internal and external systems to connections to un-trusted networks as well as satisfy audit requirements to show due diligence.

As QualysGuard Certified Specialists, this commercial tool also provides the most up to date vulnerability information and remediation advice during White Box testing phases.

Using OSSTMM methodology (Open Source Security Testing Methodology Manual), exacting requirement for audit and testing are obtained prior to a scope of work document being produced to ensure that only the specific security checks that you require are paid for.

Testing is a combination of automated tools and manual checks to ensure thoroughness.

Scope for vulnerability scanning may include:

 - Network surveying and objective network diagram
 - Port scanning of all TCP/UDP ports
 - System identification
 - Service identification
 - Vulnerability research and remediation

Penetration testing will include the tests in scope above but may also include:

 - Internet-Application testing
 - Router testing
 - Firewall testing
 - Password cracking
 - Containment Measures testing
 - Document grinding
 - Competitive Intelligence Scouting

Additional tests such as DOS testing, IDS testing and wireless testing may also be carried out dependant on requirement.

Tests may be as invasive or non-invasive as the client requires and may be remote, local, blind or target known.

Reports will be prepared and presented to include:

 - Excecutive Summary
 - Findings and analysis
 - Potential security holes and vulnerabilities broken down into priority levels
 - Recommendations and improvements to overall security
 - Assumptions made during the course of the audit
 - Appendix of material acquired over the course of the Audit

Contact Day Zero to discuss the scope and requirement of your project and allow us to prepare a scope of work document for you. or call 01782 720229.

PayPal Logo
home | about day zero | professional services | SafeXS | Stickapps for SafeXS | Devicelock USB security | McAfee Web 2.0 Protection | McAfee Email Protection | Hard Disk Encryption| AppAssure Backup and Recovery | Vipervault Cloud Replication | Deepnet T-Pass | Deepnet Mobile-ID | Contact
Copyright 2009 day zero security. All rights reserved.
Website design by Simon Rimmington