To keep up with an ever changing security and regulatory landscape requires constant testing and assessment (penetration testing) of your networks, applications and overall security programs.  This is crucial in elevating your company’s security profile to reduce risk and in achieving compliance that industry mandates.

Our security consulting services provide your company with the knowledge, expertise and efficiency needed to conduct thorough security and risk evaluations of  your IT environment.  We help you to identify gaps that create risk, develop a stronger security posture, and help  you meet your compliance mandates.

Preparing for a cybersecurity attack is not just about keeping systems up to date or ensuring that the firewall rules are constantly reviewed. Everyday there are new vulnerabilities being discovered. Therefore, it is important to take an offensive approach to cybersecurity by conducting a penetration testing. A penetration testing simulates a real cybersecurity attack on the organisation within a controlled environment. This allows the organisation to understand their cybersecurity posture better and at the same time allowing the business to run as usual without any interruptions from the penetration testing. The vulnerabilities discovered during a penetration testing is crucial for an organisation to understand and mitigate as much as possible. Penetration testing will also reveal whether the current cybersecurity controls in place are effective, or if they need to be revised to keep up with the latest threats.


As previously mentioned, there are vulnerabilities being discovered daily. Therefore, it is advisable to conduct penetration testings regularly or even as needed for situations such as the deployment of new applications and major changes to an existing application.

Benefits of performing a Penetration Testing:

Identify current cybersecurity threats.


Mitigate the risk of the vulnerabilities being exploited.

Reduce operational downtime.


A better overall understanding of the current cybersecurity posture.

How we perform a Penetration Testing:

Black-Box Testing - We simulate the attack of an attacker that has no internal knowledge of the target system.


Various tools such as BurpSuite and Nessus are also used to supplement the testing to ensure that a complete and thorough assessment is done.


Testing can be done during business hours or after business hours, depending on the risk appetite of the customer.


Testing can be done externally (remote location) or internally (within client premises), depending on the requirements of the customer.


Revalidation on issues found is done to ensure that the mitigating steps taken are working.


Our security assessment service is designed to evaluate the security architecture of your networks that you have in place to protect your systems and information assets.   We provide a numerous types of testing and assessment:

  • Internal and external network penetration testing

  • Web application security assessment

  • Mobile application security testing

  • Social engineering email testing

  • Security configuration review and advisory

  • Software development security review


Cyber criminals are increasingly sophisticated and are becoming a major threat to most organisation. Our security consultants can help you develop an appropriate IT security strategy that optimises your security requirements based on business needs. We help to create appropriate security architectures policies and procedures that would keep your business secure as it grows.   Our services includes:

  • Enterprise security strategy

  • Security architecture

  • Security policy

  • Security procedures and guidelines


With today’s sophistication of cyber threats, especially, zero day exploits, most organisations find themselves falling behind in securing and  managing their IT environment due to the lack of expertise, manpower and the fast moving security environment. To provide organisations with the capabilities to secure and manage their IT environment, our managed Vulnerability Assessment and Penetration Testing ( VAPT) services and security assessment services provides a structured approach to keeping your systems up to date. We provide on-site and off-site managed vulnerability and security assessment services whereby we will monitor your IT environment for threats and remedial alerts.


Our  risk management & audit services provide you the security, risk and compliance expertise to help you develop your security and governance programs. We can help you develop robust programs that incorporate best practices that fit your particular environment and needs.  Our security consultants have extensive knowledge and experience developing programs that incorporate best-known methods recommended by industry, as well as methods we observe during our customer engagements.

  • Security audit

  • Certification advisory services

  • Regulatory compliance services

  • Security risk assessment

  • Integrated risk management

©1996 - 2019 e-Lock Corporation Sdn Bhd
Follow us on
  • Facebook Social Icon
  • LinkedIn Social Icon
  • Instagram Social Icon
  • Twitter Social Icon