Who is this service for?

Our service is for anyone who designs and manufacture devices for domestic or commercial use.

If that is you, and you have not engaged with privacy or security concerns, then you are operating at significant risk. Mainstream news now covers security breaches regularly and at Secarma weve seen an increase of stories about products in the IoT space.

Security must be included within the very earliest stages of product development and then scrutinised by external partners such as Secarma.

Investment during development is far cheaper than a product recall. Not only should you seek advice you should do so as soon as possible.

Methodology: IoT Product Review

We enumerate, identify attack surface, then exploit.

Download Methodology

Why Secarma

In July we sent a crack team of Secarma ethical hacking specialists out to DEFCON 25. This is the world’s largest hacker convention, held annually in Las Vegas, with an estimated global attendance of 35,000 hackers.

We decided to target the IoT Village, and two competitions in particular: the Capture the Flag (CTF) and 0-day contest. We’re extremely proud to have gained maximum points in the CTF challenge, compromising every device put in front of us.

We then went on to win the 0-day content, discovering eight serious, previously unknown vulnerabilities in big brand routers and storage devices, which is the highest number found by any team over the last four years.

  • Experience Deep understanding of penetration testing, application security, cybersecurity & training.

  • Methodology Tailored, finely-tuned, in-house methodologies based on industry best practice.

  • Value We treat all clients as partners, and you'll have ongoing access to our consultancy team.

  • Education We help embed a culture of security, and teach developers how to think like hackers.

Pentest Accreditations Crest Accredited IT Health Check Service Cyber Essentials Accreditation