Cloud Cyber Security Services
We provide cyber security services which are tailored to your requirements and commercial objectives. Whether you need security assistance at the implementation phase, a security review of existing resources, or a simulated cyber attack on your cloud infrastructure, our team of highly qualified experts can help you achieve your objectives.
Features
- Internal and External Infrastructure Penetration Tests
- Web Application, Mobile Application, and API Penetration Tests
- Cloud Security Review (Cloud Resources, Networking, IDAM, PAM, SIEM, Integrations)
- Security Architecture Design, Implementation, and Review
- Red Team/Purple Team Exercises (Spearphishing, Insider Threat, SOC Review)
- Cyber Crisis Tabletop Exercise
- Compliance Assessment (ISO, SOC2, CSA, NIST, NCSC)
- Employee Training (Security Awareness and Secure Code Development)
- Device Configuration Review
- Source Code Review
Benefits
- Identify vulnerabilities in existing applications and infrastructure
- Understand the risks associated with your applications and infrastructure
- Identify security gaps in your cloud architecture and IDAM model
- Ensure security principles are enforced prior to cloud implementation
- Assess your company's response against a simulated cyber attack
- Test and improve your company’s crisis management procedures
- Identify gaps in your policies and procedures against industry certifications
- Upskill employees to increase security awareness and design secure applications
- Identify vulnerabilities in your device management configuration
- Identify vulnerabilities and poor development practices in your source code
Pricing
£1,080 to £2,500 a user a day
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 6 7 3 5 4 1 0 4 7 0 7 1 3 7
Contact
WILBOURNE LTD
Ryan Siu
Telephone: +44 (0) 7511 197621
Email: tenders@wilbourne.co.uk
Planning
- Planning service
- Yes
- How the planning service works
-
We perform cloud security architecture design, review, and implementation guidance for organisations irrespective of hosting type or cloud vendor(s). Each of these stages can be performed in sequence or independently depending on the organisation's requirements and will be conducted according to relevant cloud security frameworks (CIS, CSA, NIST, NCSC).
In the design stage, we assist in the creation of security architecture diagram(s), which will highlight key security areas which should be configured as part of your cloud environment. This design will also include an Identity and Access Management (IDAM) and Privileged Access Management (PAM) structure relevant to your requirements.
In the review stage, we will perform a security review of any existing architecture, IDAM/PAM strategy, and network diagram(s). This will include a threat modelling assessment to identify any potential vulnerabilities and provide recommendations. - Planning service works with specific services
- No
Training
- Training service provided
- Yes
- How the training service works
- We provide two main types of cyber security training. The first is security awareness training, which focuses on increasing the security knowledge of all employees so they are aware of potential attacks that threat actors may conduct and how to react in such scenarios. The second is training tailored to a specific team or group of employees. This can cover multiple areas such as secure code development training for developers, secure design and implementation for cloud architects and DevOps teams, and incident handling practices for SecOps or SOC teams. Each training course will be tailored to your company’s infrastructure, technologies, and existing security maturity.
- Training is tied to specific services
- No
Setup and migration
- Setup or migration service available
- No
Quality assurance and performance testing
- Quality assurance and performance testing service
- No
Security testing
- Security services
- Yes
- Security services type
-
- Security strategy
- Security risk management
- Security design
- Cyber security consultancy
- Security testing
- Security incident management
- Security audit services
- Other
- Other security services
-
- Penetration Testing
- Scenario-Based Red Team Assessment
- Insider Threat Assessment
- Purple Team Assessment
- SOC Capability and Incident Response Assessment
- Certified security testers
- Yes
- Security testing certifications
-
- CHECK
- CREST
- Cyber Scheme
- Other
- Other security testing certifications
-
- CISSP
- CCSP
- OSCP
- ISO27001 Lead Auditor
- ISO27001 Lead Implementer
Ongoing support
- Ongoing support service
- No
Service scope
- Service constraints
- No constraints - we are able to work both remotely and on-site.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 1 working day.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
-
We support multiple chat platforms, for example Teams, Zoom, or Slack, and will setup a shared channel where we can communicate during the course of the engagement.
Where possible, captions can be enabled in meetings, recordings are made available, and meeting summaries can be provided on request. - Web chat accessibility testing
- We have tested the live captions, text re-sizing, audio control, and colour control on our meetings and presentations.
- Support levels
-
Our support level will be dependent on the service being provided. We will be contactable via email or phone during the duration of the engagement and will aim to respond to queries within 1 working day.
During the engagement, we will setup a shared chat channel, for example via Teams, Zoom, or Slack, where we will provide updates and answer any questions you may have.
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- IASME Cyber Assurance Level 1
- IASME Governance Gold Audited
- IASME Quality Principles
Social Value
- Social Value
-
Social Value
Tackling economic inequalityTackling economic inequality
We provide training and employment opportunities for people who do not have industry experience and wish to up-skill themselves in the cyber security sector.
Pricing
- Price
- £1,080 to £2,500 a user a day
- Discount for educational organisations
- Yes