Edgescan was founded in 2011 to address the problem of system (in)security whilst keeping pace with rapid development and change. Using the latest technologies edgescan provides high class vulnerability management paired with expert manual validation for every vulnerability.

Enterprises need to truly provide safe digital experiences to their customers, partners and entire ecosystem by securing the applications and supporting host infrastructure at the heart of their business on a continuous basis. With the expert manual validation, context of each vulnerability is taken into account when it is being risk rated to ensure that the potential risk to each organisation is understood completely.

 Continuous Vulnerability Management 

Edgescan is an award-winning Managed Security Services Provider (MSSP) which gives you peace of mind when it comes to detecting security weaknesses which may result in a breach, reputation damage or loss of revenue.

Why Edgescan and the award-winning MSSP?

  • Continuous fullstack vulnerability management keeps pace with constant changes to your environment.

  • As new cybersecurity issues are made public Edgescan helps detect if you are vulnerable.

  • As new code is deployed, or application features are delivered to your clients, Edgescan will help ensure you have not introduced any additional risk.

  • Continuous vulnerability management resulting in continuous vulnerability intelligence.

  • Your applications and supporting hosts (fullstack) are scanned and assessed for vulnerabilities and security weaknesses on a continuous, scheduled or on-demand basis.

The continuous approach to vulnerability management means continuous and on-demand monitoring for security weaknesses.
The vulnerability detection and intelligence technology with expert validation and support results in unparalleled visibility and a strong cybersecurity posture.

 

Edgescan is considered one of the Top MSSP firms globally when it comes to managed cyber security. 

 

Edgescan is also a PCI (Payment Card Industry) Approved Scanning Vendor (ASV) which helps you maintain PCI compliance and a strong security posture on a continuous basis.

How Edgescan works?

 API Security Testing 

API Security assessments can be difficult due to many tools simply not being built to test API security. Edgescan provides continuous security testing for the ever-growing world of APIs. APIs are becoming ever more popular given the explosive growth in mobile apps and the fintech sector. Edgescan is accustomed to providing rigorous testing to APIs in all their shapes and forms. This can include but is not limited to SOAP/XML, RESTful and other Web Services.

 

Built for API testing: Traditional web scanning tools simply don’t scan APIs with any rigour.  Edgescan’s custom API technology can map an APIs method calls via ingestion of descriptor files and also provide rigorous assessment coupled with intelligent expert validation for particular classes of vulnerability.

 

Fast API Dynamic Analysis

 

Edgescan can

  • Assess APIs for security issues, providing false-positive free vulnerability intelligence.

  • Edgescan’s API Scanner is able to detect vulnerabilities in any API, such as mobile back-end servers, IoT devices, and any RESTful APIs.

  • Consume API descriptor files (Swagger, JSON, WSDL, YAML) and automatically test documented methods.

  • Deliver API discovery profiling to help you maintain an asset register of APIs live on your estate.

  • Discover APIs across your IP/CIDR ranges using our multi-layer API discovery technology  – Find rogue or unknown APIs across your estate and alert you to new  discoveries

 

No Limits

Scan on demand as much as you need. Scans can be invoked via API for DevOps environments and via the Edgescan portal.

“Edgescan API Security Testing combines technical and logical security testing, all of which is validated & supported by experts.”

 

Edgescan – how it works and API Security Testing

  • Coverage and Depth: Edgescan technology uses bespoke scanning engines in order to provide optimal coverage of the API. API vulnerabilities can be different from typical web application issues.

  • Intelligent Assessment: Edgescan API assessments also assess logical controls associated with the API; items such as authorization, request flooding, parameter manipulation and attribute injection are assessed to help ensure you have a strong security posture.

  • Support: In combination with expert support, we tend to get more coverage and depth on our API assessments, rather than just firing web scanners at the target.

Edgescan – Continuous API Security Testing

Edgescan’s API assessment technology can be delivered on a continuous basis in order to detect the latest vulnerabilities and on an on-demand basis both via our Edgescan API or client portal.

All discovered issues as a result of the API Security testing can be discussed with our security team in order to help you understand the issues discovered and how to mitigate them and improve security posture.

API Discovery: Using multi-layer probing techniques

Multi-layer probing across IP/CIDR ranges designed to detect rogue or unknown deployed API endpoints.  API Discovery from Edgescan is part of the Edgescan continuous asset profiling service that allows you to understand the API topology within an estate. With cataloguing and categorizing correlation technology, it is possible to find a true inventory of APIs and exposures facing the public Internet.  Our proprietary discovery process runs continuously across your entire estate non-stop, 24 hours a day, all year around.

 Penetration Testing 

Edgescan provides manual consultant based penetration testing.

  • Edgescan use only experienced, qualified consultants to manually test the technical and logical security posture of your assets, be they API’s, Cloud based infrastructure, Web or mobile applications.

  • Manual penetration testing combines human expertise on top of professional penetration testing software and tools, such as automated static and automated dynamic analysis, when assessing high assurance applications.

  • A manual penetration test (Pen Test) provides complete coverage for standard technical vulnerability classes, as well as other design, business logic and complex risks that can only be detected through manual testing.

 Application Security & Mobile Application Security 

Continuous Vulnerability Management

  • Using Edgescan's technology we can assess the supporting backend services of any mobile application to help ensure a strong security posture.

Device Digital Forensics

  • Edgescan's team is experienced in profiling mobile applications for cyber security issues relating specifically to mobile application device security.

  • Items such as Information leakage, Rooting weaknesses, Malware weaknesses and source code security weaknesses can be verified by Edgescan's team of security experts using digital forensic techniques.

360º Technical Security Reviews

  • Using techniques such as Penetration Testing, SAST (Source code review), Digital Forensics, and DAST Edgescan's professional services team can help ensure a mobile application is secure, robust and built using leading security practice. Edgescan's 360° testing covers supporting hosts, servers, cloud, API’s and also client-side code for any mobile application. Of course everything is manually validated for accuracy, risk rating and support to help you address any discovered issues is included.

Edgescan Professional Services: Edgescan-PS

  • Edgescan and Edgescan Professional Services (Edgescan-PS) work together to provide an award-winning MSSP, pen-testing and Mobile Application Testing solution and service.

 Merger & Acquisition Security Assessment 

Ensuring Your Investment is Secure

Digital Assurance

  • Current merger and acquisition (M&A) activities may have a significant digital component as part of the investment.

  • Growth of the digital economy is still in full swing with no signs of slowing down.

  • Many high-growth businesses contain a significant digital property/platform which is key to business engagement.

  • Technical due diligence of such properties is key to any successful merger & acquisition or investment to help ensure the acquired company is on a technically strong footing.

  • Cybersecurity is of paramount importance when considering the digital economy.

  • Cybersecurity is a significant aspect to any merger, investment or acquisition of a digital business.

© 2019 Squalo Cybersystems | All rights reserved | Privacy Policy