Physical security assessments examine your company’s susceptibility against an attacker that tries to physically break into your company. This includes perimeter security, building security, access control systems as well as the implementation of security policies.
During such a test, our consultants use the methods of an attacker to attempt to gain unauthorized access to your physical infrastructure. In addition, we attempt to achieve pre-defined objectives that you set, such as
- Getting access to employee workstations or servers
- Stealing assets owned by your company (e.g. laptops, hard drives or cars)
- Getting access to restricted rooms (e.g. server rooms or C-level offices)
- Planting remote access hardware within your network