Services -


Vulnerability Assessment and Penetration Testing

Vulnerability Assessment

We analyse and understand security risks to your business by performing comprehensive and managed vulnerability assessment.

Cyber security is constantly changing and new threats and vulnerabilities against businesses emerge every day. One way to secure company assets, maintain an awareness of the vulnerabilities in your environment and respond quickly to mitigate potential threats is through a regular vulnerability assessment.

A comprehensive vulnerability assessment provides organisations with the knowledge, awareness and risk background necessary to understand threats to their environment. Remediation measures can then be applied accordingly. Identifying risks before hackers do will drastically improve the cyber security posture of your business.

What is a vulnerability assessment?

Centric Consulting’s Vulnerability Assessment service helps to identify, quantify and address the security vulnerabilities that exist within your company’s infrastructure, including on-premise and cloud networks. Our cyber security professionals integrate advanced scanning technology into all vulnerability assessments, providing a high level of support required to address identifiable vulnerabilities.

What we assess

Centric Consulting's Vulnerability Assessment utilises advanced scanning software to detect live risks to your company’s infrastructure, identifying new internal and external vulnerabilities, preventing unauthorised access. Our qualified IT experts review the results of the vulnerability scans to provide a report, outlining key recommendations and threat remediation advice.

We test against the world’s largest integrated public database of exploits and provides the following benefits:

  • Identification of systems and processes that pose a security risk before attackers identify them.
  • Inventory creation of all devices on a business network, including system information.
  • Defined level of risk that exists on the network.
  • Inventory of all devices within the business to assist with future upgrades and future vulnerability assessments.

Penetration Testing

Preparing your business IT systems and infrastructure against any cyber attack is highly reccommended.

We’ll strengthen your network against cyber-attacks with our penetration testing services. Using ethical hacking techniques, real-world cyber-attacks are simulated through internal and external penetration tests to identify any cyber security weaknesses. We’ll expose your security vulnerabilities before hackers exploit them.

Any vulnerabilities that are identified by our team will have remediation techniques applied immediately to secure your IT infrastructure. Extensive reporting is provided, including executive summaries and detailed technical recommendations to enhance the level of existing security within your organisation’s networks.

What is Penetration Testing?

Penetration testing (also known as a ‘pentesting’) is an ethical hacking process designed to assess computer systems, networks and applications. This is with the aim of testing the ability of your systems to withstand a sustained cyber-attack and identify and address security vulnerabilities that could be exploited by cybercriminals.

Penetration Testing Services

  • Network testing
  • Web application security testing
  • Wireless network testing
  • Mobile security testing
  • Physical Devices
  • Firewall configuration review
  • Host configuration review


IT Solutions

QuickBooks Consulting

QuickBooks Consulting

Centric Consulting is the partner you need to protract your small business or organization to improv...

Read More »


Sage ACCPAC Consulting

Sage ACCPAC Consulting

Take advantage of the freedom to do ERP your way. Designed from the ground up to meet the demanding ...

Read More »


SAP Consulting

SAP Consulting

Centric Consulting has partnered with SAP to provide SAP B 1 implementation and training services in...

Read More »