PENETRATION TESTING IS WHAT WE DO

We strongly believe that our unique combination of competencies make us a good candidate to deliver any project

Our services

Internal Network penetration testing logo

Internal Network Penetration Testing

A real Ethical Hacking approach where we act just as hackers would. Applying a strategic way of thinking in order to identify breaches in your system at all levels. This will help give you insights that you can act on to develop efficient defense measures that protect your business.

Web Mobile IoT Desktiop application penetration testing logo

Application Security

Identifying exploitable vulnerabilities in applications before hackers are able to discover and exploit them. From web, mobile or any type of application, penetration testing can reveal real-world opportunities for hackers to obtain unauthorized access to sensitive data. They could even take-over systems for malicious/non-business purposes.

Cyber Forensics and Investigation service icon

Forensics and Investigations

We identify the threats coming from inside or detect what a hacker that already penetrated the system has stolen. Fully investigating your cyber security defense to identify the losses. Providing deep-dive, manual and automated forensic investigation performed by experienced penetration testers and investigators.

Cyber Security Corporate Training

Enterprise Training

Experience the industry’s most realistic penetration testing security training courses. Taught by the ethical hackers that went through hundreds of pentests. Our information security training will immerse you into the deep-end of hands on, real world pentesting.

What recommends us

The team is very professional, even going the extra mile caring for customer needs and all the details of the collaboration. This attention to detail both for the human factor and the technical expertise motivated me to have the ongoing project and wish to maintain this for the foreseeable future.​
Catalin Priscornita testimonial picture for Cyber Threat Defense
Cătălin Priscorniță
CEO, Blitz.ro
Cyber Threat Defense has been a valuable partner in securing our software. Their outside the box perspective has pointed us attack scenarios that we are now paying more attention to.
I recommend CTD. They will certainly improve the level of security in your company.
Andrei Andreias testimonial picture for Cyber Threat Defense
Adrian Andreiaș
CEO, hosterion.com

GET a Free Quote today

oUR THREE PHASE APpROACH

DETECTING THREATS BY THINKING LIKE THE ENEMY

identify assets

Offering clear advice

By working closely with our customers and using transparent language, we take away the confusion of cyber security keywords and closely identify what needs to be tested and what is the right security service

DEFENSE CONSOLIDATION

Reporting, Readjusting & Retesting

We communicate back the identified risks and we help organisations develop a strategic plan to readjust and protect against future attacks

After adjusting we retest the application and systems to make sure no vulnerability has been left unchecked

Penetration Tests

Manual and automated pentesting

By adopting the same tools and tactics as cyber criminals, our experts help organisations identify the weaknesses an attacker could exploit. We test the security of the application, server or network and identify the vulnerabilities that offer hackers access to unauthorized data. We classify the vulnerabilities by their risk.

Critical 89%
High Risk 61%
Medium Risk 71%
Low Risk 50%

Competence above all else

CTD’s team of dedicated security engineers and ethical hackers have trained themselves to the highest professional standards. This is to ensure that we retain our excellence in helping businesses defend against the latest cyber threats. Our accreditations include:

Offensive Security OSCP Certification
Offensive Security OSCE Certification
GIAC Exploit Researcher And Advanced Penetration Tester GXPN
Metasploit Framework for Penetration testing
Information Security Foundation based on ISO 27001
CompTIA Security Plus certification
Kali Linux Penetration testing 4.0
Nessus Vulnerability Scanner PRO
SANS Penetration Testing Methodology
Microsoft Certified Professional Certification
OWASP Testing Guide Methodology Application Security Pentest
Nexpose PRO enterprise vulnerability scanning

Media

Cyber Threat Defense at Business 24 newspaper
Cyber Threat Defense @ Business24
Cyber Threat Defense at Realitatea FM
Daniel Ciobanu Live @ Realitatea
Cyber Threat Defense at Cluj Today
Story of Cyber Threat Defense
Cyber Threat Defense at Vocea Valcii newspaper
CTD the "Good guys" in the Hacking world
Cyber Threat Defense at Ora de Sibiu newspaper
About CTD in local newspaper
Cyber Threat Defense at Ziua de Cluj
"Realitatea" publishing an article about CTDw

Gain confidence in your IT Systems

We can help