tr?id=308091010061282&ev=PageView&noscript=1 Penetration Testing
Web Security
The next generation of web filtering – with custom filters, content analysis and real-time feedback.
VPN Services
A range of VPN service options ensure that your mobile workforce are able to work productively, easily and securely.
Private IP Internet
Private IP Internet injects secured business internet access to all sites across your Private IP network, reducing dependence on any single site.
Search Engine Optimization
Every business needs to invest in search engine optimization. Search engine optimization is the process of optimizing your website to maximize organic traffic from search engines. The leading search engines are Google, YouTube, Bing, and Yahoo.
Project Services
We take full control of the entire deployment process while keeping communication simple and the project within budget.
Private Cloud
Deploy computing resources on demand and respond faster to change with Infrastructure as a Service.
Call Centre Systems
Enhance the efficiency of your Contact Centre and give your agents the tools to bring your customers closer.
Buy IT Hardware
Our aim is to make IT hardware procurement quick and easy for your organisation, by providing you with leading industry experience and expertise.
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • Web Security
  • VPN Services
  • Private IP Internet
  • Search Engine Optimization
  • Project Services
  • Private Cloud
  • Call Centre Systems
  • Buy IT Hardware

Understand if your network is fully protected and uncover hidden vulnerabilities in your network with a Security penetration test.

What is Penetration Testing

  • Penetration testing is a systematic method of regularly evaluating the security of the computer system or networks by simulating an attack or intrusion from a malicious source to ultimately take recommended corrective action and evaluate the effectiveness of existing security measures.

What does Penetration Testing involve?

The process involves an active analysis of the system for any potential vulnerabilities that could result from poor or improper system configuration, known and unknown hardware or software flaws, or operational weaknesses in process or technical countermeasures. This analysis is carried out from the position of a potential attacker and can involve active exploitation of security vulnerabilities. The intent of a penetration test is to determine the feasibility of an attack and the amount of business impact of a successful attack. We’ll present any security issues that are found, together with an assessment of their impact, and a proposal for mitigation.

PKML Professional Services can also deliver its penetration testing against your infrastructure targets as well as web applications, wireless networks and operations:

Web application security review 

  • We can perform web application penetration testing against nominated targets by searching for vulnerabilities and weaknesses using automated and manual techniques. All testing activities can be performed from the perspective of either an authenticated or unauthenticated attacker or both and delivered either remotely or on-site at any time that suits your business requirements.

Wireless security testing 

  • Our consultants can perform an onsite security assessment of your wireless infrastructure. This can be done passively by reviewing the system configuration or ‘actively’ by attempting to compromise the wireless infrastructure using specialized hardware and software.

Social engineering

  • Trained consultants can attempt to infiltrate your organisation and determine what kind of access as a highly motivated attacker could achieve. Using methods such as phone calls, spear phishing emails and dumpster diving, our consultants attempt to find out as much information as possible about your organisation. In addition, infiltration and tailgating activities, identification forging, eavesdropping on communications and other advanced attack techniques can be carried out against an organisation in the hopes of comprising its security.

Denial of Service (DoS) assessment

  • We can test the strength of your infrastructure by intelligently exploiting any weakness in services or web applications to cause your environment to fail against application-layer Denial of Service attacks. Such techniques include exploiting known denial of service conditions, form submissions and HTTP/S conditions. DoS assessments do not include volumetric testing as this could have an impact on networks outside the scope of work.


If you have question, Contact us below

For Support - Please call 07 2100 1288 | For Services Information - Click here | For Payment - Click here | For Inquiry - Please fill the form below | For Live Help - Click Help below right

Business Hours - Monday to Friday: 8:00am to 5:00pm