top of page

SERVICES

Palantir Security specialises in providing high-end professional services in the traditional Cyber Security and Product Security domains. Our services are based on proven experience and practical methodologies and are tailored to fit our customers' specific requirements.

Secure Coding Training

icon_1.png

Educating developers is a key component in building secure systems and products from inception. Our Security Training experts will guide your development teams, providing the required theoretical knowledge and practical hands-on tools, to both understand the threat landscape and attack vectors, and properly mitigate threats with proven defensive programming practices.

icon_5.png

Security Code Reviews

A review at the Source Code level can provide the additional insights that often cannot be effectively detected when using traditional Dynamic Security Testing methods and tools (DAST). Our Secure Coding experts can provide you with both Automated, Manual as well as Hybrid Security Code Reviews to systematically detect your product security vulnerabilities on the source code level and advice you on a practical mitigation techniques.

icon_8.png

Cyber Intelligence

Being proactive is a key element when defending against APT or other persistent Threat Actors. Our Cyber Intelligence experts can use OSINT as well as dedicated advance intelligence platforms to provide your organization with proactive insights on targeted hacking campaigns and plans, 0-Days and 1-Day vulnerabilities found in your technologies, products and sensitive organizational assets that may have been captured by malicious entities.

icon_6.png

Security Risk Analysis and Audits

Key part of risk management is being able to assess your risk and accordingly perform risk mitigation planning. Our Security Experts will use our proven methodologies to perform Security Risk Analysis that will be comply with your Security Policy and/or Regulatory requirements and will provide comprehensive analysis of your security posture for either organizational unit, network, system, interface, product or even new technology stacks.

Secure SDLC Consulting

icon_4.png

Security in not all about technology. Developing a secure system or product in an efficient and consistent way is considered an art in its own right.  Our SDL Process experts bring in our experience with designing SDL processes for large enterprises. This will assist you in designing a Secure Development Process that will suit your organizational needs and goals in the most optimal way.

Penetration Testing

icon_3.png

It is a known fact that there is no better way to validate your security posture than running a simulation of a “Real World” hackers attack, trying to break your system or maliciously use your product. Our professional Red Teams will perform consistent simulation of hacking attempts in a controlled and methodological manner, focusing on a specific technology stack or a system interface, or performing an "all combined" attack scenario.

icon_2.png

Threat Modelling

“Know your Enemy” is a key principle to adopt when planning and designing a secure system or product, so that security controls and safeguarding measures can be most appropriately chosen and used. Our Security Architects will assist you in performing comprehensive Threat Modelling Exercises and Workshops to consistently map all relevant system threats, as well as ensuring the effectiveness of the selected controls and mitigation.

bottom of page