Services
Our services are designed to provide you with the right level of engagement, suited to your budget, your product's life stage and your technical needs. If you have something specific in mind but don't see it below, don't hesitate to get in touch.
Advice
The earlier any issue is identified in the developement lifecycle the cheaper it is to fix issues. The Advisory service allows you to flexibily access confidential live consultations, where we provide wholistic technical security and risk advisory about your product.
Commitment
Month to month
Deliverables
Up to 10-hours live consultation, emailed discussion summaries provided after each conversation.
When
Ideally after you have nailed down the idea but no later than prototyping. The objective here is to identify any technical security or regulatory gotchas that you may not be aware of as you are giving birth to your product.
Book AdvisoryConsulting
Consultancy is designed for teams that want product security input throughout the product development process. Acting as consultant engineers, we employ an array of security methodologies such as threat modelling, threat vector analysis and similar, suggesting solutions along with any issues we identify.
Commitment
3-Months
Deliverables
Up to 30-hours of time, collaborating across mediums with the product engineering team. Where applicable written solutions, diagrams and conversation summaries.
When
After the prototyping phase, during the product build phase. In our experience this is when details, major and minor alike can be subject to change as new constraints are discovered. Having our team involved over an extended period of time allows for us to provide the consistent value and adapt our feedback in line with any updates to the product.
Book ConsultancyEvaluations
For teams requiring a full digital product security and risk assessment, including assessment scoping, data gathering, threat modelling, risk summaries and recommendations, documented in a concise detailed report.
Commitment
Scope dependent
Deliverables
A full formatted report with process, findings and recommendations.
When
Once the development process is complete and the product is ready to ship. The objective is to identify high level risks and issues that could undermine the security posture of your product and provide workable solutions.
Book Evaluations