Services

Our services are designed to provide you with the right level of engagement, suited to your budget, your product's life stage and your technical needs. If you have something specific in mind but don't see it below, don't hesitate to get in touch.

Advice

The earlier any issue is identified in the developement lifecycle the cheaper it is to fix issues. The Advisory service allows you to flexibily access confidential live consultations, where we provide wholistic technical security and risk advisory about your product.

Commitment

Month to month

Deliverables

Up to 10-hours live consultation, emailed discussion summaries provided after each conversation.

When

Ideally after you have nailed down the idea but no later than prototyping. The objective here is to identify any technical security or regulatory gotchas that you may not be aware of as you are giving birth to your product.

Book Advisory

Consulting

Consultancy is designed for teams that want product security input throughout the product development process. Acting as consultant engineers, we employ an array of security methodologies such as threat modelling, threat vector analysis and similar, suggesting solutions along with any issues we identify.

Commitment

3-Months

Deliverables

Up to 30-hours of time, collaborating across mediums with the product engineering team. Where applicable written solutions, diagrams and conversation summaries.

When

After the prototyping phase, during the product build phase. In our experience this is when details, major and minor alike can be subject to change as new constraints are discovered. Having our team involved over an extended period of time allows for us to provide the consistent value and adapt our feedback in line with any updates to the product.

Book Consultancy

Evaluations

For teams requiring a full digital product security and risk assessment, including assessment scoping, data gathering, threat modelling, risk summaries and recommendations, documented in a concise detailed report.

Commitment

Scope dependent

Deliverables

A full formatted report with process, findings and recommendations.

When

Once the development process is complete and the product is ready to ship. The objective is to identify high level risks and issues that could undermine the security posture of your product and provide workable solutions.

Book Evaluations