LGMS

LGMS has since built a reputation for its integrity, values, and best practices. LGMS delivers professional services to local, regional, and international clients of different industries.

  • +(60) 3 – 8605 0155
  • info@lgms.global
  • A-11-01, Empire Office Tower
    Jalan SS 16/1,
    Subang Jaya, Selangor 47500
    Malaysia

Filter Results By:

Products

Applications

Showing results: 1 - 12 of 12 items found.

  • Cyber Drill And Blue Team Exercise Stimulation

    LGMS

    LGMS Security Team will approach the Cyber Drill as a simulation of the possible occurrences during a cyber incident. Based on the defined scenario, LGMS Security Team will perform a technical simulation so as to accurately capture the responses of client’s team in responding to such incidents.In order to obtain the best results, LGMS Security Team will only use information that can be obtained either through public information or by any means of deception techniques.

  • Social Engineering With Physical & Logical Attack

    LGMS

    LGMS Security Team will approach the Social Engineering assessment as an intelligence operation. During the course of assessment, LGMS Security Team will base on clear objectives to breach the security controls using information that has been obtained through deception including phishing emails, sending of malicious parcels (CD or thumb-drives), and social engineering phone calls.

  • Source Code Review

    LGMS

    Source code review, also known as Security Code Review is the process of auditing the source code for an application to verify that the proper security controls are present, that they work as intended, and that they have been invoked in all the right places. Code review is a way of ensuring that the application has been developed to be “self-defending” in its given environment.

  • CREST Penetration Testing

    LGMS

    CREST is a not for profit organization that serves the needs of a technical information security marketplace that requires the services of a regulated professional services industry.

  • IoT Devices Penetration Testing

    LGMS

    There is a rising concern that IoT devices are being developed rapidly without appropriate consideration of the profound security challenges involved, as demonstrated by the various IoT devices hacked in recent years— automobiles, cameras, children's toys, thermostats, and medical devices.With more than a decade of specialized cyber security testing experience combined with our extensive research and development, we can assess and identify both common and complex security vulnerabilities that may be residing within your whole IoT ecosystem.

  • Mobile Application Penetration Testing

    LGMS

    A Mobile application is an application that runs on mobile devices. It has become a dominant and popular business tool today. Corporates are empowering mobile devices by offering more and more services on mobile and handheld devices. Unfortunately, mobile devices like notebook computers, PDAs, Pocket PCs, smartphones, and BlackBerrys are all attractive targets for malicious attackers. By accessing your corporate network via email, VPNs, and other means of remote access, a successful compromise can result in the exposure of Personally Identifiable Information, corporate secrets, customer data, and additional sensitive information.

  • Penetration Testing

    LGMS

    Our penetration testing services reveal real vulnerabilities that matter to your environment. Ultimately LGMS will provide advisory and guidance to help your business to become more secure.

  • Wireless Network Penetration Testing

    LGMS

    LGMS wireless network penetration testing uses automated and manual penetration techniques to locate and map authorized and unauthorized wireless access points, review corporate access point configuration and then discover weaknesses that could allow an attacker to penetrate those networks. Potential internal and external threats are documented, and a recommended action plan is developed to address any security risks.

  • Web Application Penetration Testing

    LGMS

    Web Application Penetration Testing – to identify, analyze, and report vulnerabilities in a given web application. LGMS adopts a robust technology and process-based approach supported by a well-documented methodology to identify potential security flaws in the web application and the underlying environment.

  • Intelligence – Led Penetration Testing

    LGMS

    An Intelligence-Led Penetration Test (Intel-led Pentest) closely mimics the tactics and techniques of sophisticated and persistent cyber attackers with the intention of compromising an organization’s critical systems.

  • SST Security Assessment

    LGMS

    Self-Service Terminal (SST) penetration testing is an activity which identifies vulnerabilities in SST that may potentially exist due to the lack of physical security measures, technical configuration or process controls.

  • Red Team Engagement

    LGMS

    Red Team Assessment (Red Teaming) is an activity where a group of white hat hackers (or penetration tester) perform a series of activities to assess the company’s security readiness towards real-world cyber threats. Red teaming aims to ‘attack’ an organization’s digital and physical infrastructure to evaluate the organization’s security defense and posture, at the same time targeting to obtain any sensitive and beneficial information. Red Teaming usually emulates several malicious actors to penetrate the organization’s digital and physical infrastructure security.

Get Help