What we offer
Services
Every engagement is scoped to your environment, your risk profile, and your objectives. We do not sell packages — we design assessments.
Physical Penetration Testing
A controlled, authorised attempt to breach your physical perimeter using the techniques a real attacker would use.
- —Perimeter and access point assessment
- —Lock, barrier, and access control bypass attempts
- —Tailgating and impersonation scenarios
- —Sensitive area access testing (server rooms, executive floors, document stores)
- —Photographic evidence and full written report
Ideal for
Organisations wanting to know if their physical controls hold under pressure.
Social Engineering Assessment
Testing how people and process respond to the attacker techniques that bypass technical controls entirely.
- —Pretexted on-site visits (contractor, delivery, vendor)
- —Reception and front-of-house challenge testing
- —Tailgating observation and measurement
- —Staff response to suspicious activity
- —Written findings with staff training recommendations
Ideal for
Organisations that have invested in physical hardware but have not tested the human layer.
Security Audit & Review
A structured walkthrough and review of your physical security posture — no active attack attempts, but a thorough expert eye.
- —CCTV coverage gap analysis
- —Lock grade and hardware review
- —Access control policy and list review
- —Signage, zoning, and visitor management review
- —Prioritised written recommendations
Ideal for
Organisations starting their physical security journey or preparing for certification.
Remediation Roadmap
Following any engagement, a prioritised action plan your team can execute — written for decision-makers and operations alike.
- —Risk-ranked finding register
- —Quick wins versus long-term improvements
- —Cost-conscious recommendations
- —No vendor bias — hardware and process recommendations only
- —Optional follow-up review to verify remediation
Ideal for
Any client who has received findings and needs a clear path forward.
How it works
Our process
From first contact to final report, here is what to expect.
Scoping call
We understand your site, threat model, and objectives. No cookie-cutter engagements.
Rules of engagement
A clear written agreement covering what is in scope, timing, and authorisation.
Assessment
The work — conducted with professionalism and discretion.
Debrief
A verbal walkthrough of findings before the written report lands.
Report
Plain-English findings with photographic evidence and a remediation roadmap.