THRESHOLD

Services

Every engagement is scoped to your environment, your risk profile, and your objectives. We do not sell packages — we design assessments.

01

Physical Penetration Testing

A controlled, authorised attempt to breach your physical perimeter using the techniques a real attacker would use.

  • Perimeter and access point assessment
  • Lock, barrier, and access control bypass attempts
  • Tailgating and impersonation scenarios
  • Sensitive area access testing (server rooms, executive floors, document stores)
  • Photographic evidence and full written report

Ideal for

Organisations wanting to know if their physical controls hold under pressure.

02

Social Engineering Assessment

Testing how people and process respond to the attacker techniques that bypass technical controls entirely.

  • Pretexted on-site visits (contractor, delivery, vendor)
  • Reception and front-of-house challenge testing
  • Tailgating observation and measurement
  • Staff response to suspicious activity
  • Written findings with staff training recommendations

Ideal for

Organisations that have invested in physical hardware but have not tested the human layer.

03

Security Audit & Review

A structured walkthrough and review of your physical security posture — no active attack attempts, but a thorough expert eye.

  • CCTV coverage gap analysis
  • Lock grade and hardware review
  • Access control policy and list review
  • Signage, zoning, and visitor management review
  • Prioritised written recommendations

Ideal for

Organisations starting their physical security journey or preparing for certification.

04

Remediation Roadmap

Following any engagement, a prioritised action plan your team can execute — written for decision-makers and operations alike.

  • Risk-ranked finding register
  • Quick wins versus long-term improvements
  • Cost-conscious recommendations
  • No vendor bias — hardware and process recommendations only
  • Optional follow-up review to verify remediation

Ideal for

Any client who has received findings and needs a clear path forward.

Our process

From first contact to final report, here is what to expect.

01

Scoping call

We understand your site, threat model, and objectives. No cookie-cutter engagements.

02

Rules of engagement

A clear written agreement covering what is in scope, timing, and authorisation.

03

Assessment

The work — conducted with professionalism and discretion.

04

Debrief

A verbal walkthrough of findings before the written report lands.

05

Report

Plain-English findings with photographic evidence and a remediation roadmap.

Ready to talk?

Start with a scoping call — no commitment, no sales pressure.

Get in touch