(ID999) INCIDENT RESPONSE - Tel: UK 0044 1732 897 601

Pen Testing, Security Audits & Vulnerability Assessments

Security vulnerability auditing & pen testing services

BII delivers the highest quality penetration testing services and consultants in the industry. Our clients are spread across central and local government, financial and FTSE 100 sectors. Our consultants hold many security clearances and are certified to the highest industry standards including CESG CHECK and CREST Infrastructure and Web Application standards. Above all else BII delivers a service with continuity and communicates clearly with reports that are both technical and simplified for senior management.

Network penetration testing

Network penetration testing assesses the security risks exposed by computer systems operating on a network. Networks with weak security can allow attackers to penetrate network defences and gain access to internal networks and critical systems. Regular network penetration testing can reduce the threat of these attacks, and save time and money in the aftermath of a security breach.

Common threats against networks include buffer and integer overflow attacks, format string attacks, insecure database services, vulnerable DNS servers, weak passwords/default credentials to administration consoles, DoS (Denial of Service) attacks, unencrypted network services and more.

GCSx CESG CHECK Penetration Testing

All of BII's contracted penetration testers are CESG CHECK accredited, BII offers industry leading CHECK penetration testing at competitive rates. For over ten years BII has delivered long term ITHC contracts at reduced prices. We are strong enforcers of engineer rotation for best business practice and all consultant profiles are provided to our clients prior to any testing. BII's CHECK accredited consultants will work with you to define an appropriate scope of I.T Health Check dependent on the size and complexity of your network. 

IT health checks

ITHC assessments include a number of remote and onsite device configuration reviews and active tests as shown below:

  • Firewall Security Assessment
  • External Network Penetration Test
  • Onsite Network Penetration Test
  • Operating System Assessment
  • Mobile Device Security Assessment
  • SSL VPN Assessment
  • Wireless Infrastructure Assessment
  • IDS/IDP Assessment
  • Application Security Assessment

Schedule an audit/test or request a quotation

In order for BII to better understand your requirements please complete and return a scope document as listed below.

Scope Document (General)
Vulnerability Assessment - Pen Test

Scope Document (Local Authority)
GCSx CoCo IT Health Check (CHECK)

Scope Document (PCI)
Payment Card Protection

Once we have recieved your completed scope document your dedicated account consultant will respond with a statement of work, number of days on and off site and associated day rates. All of BII's proposals include expenses and are fixed totals for your convenience.

If you do not understand your obligations please get in touch with us to discuss in confidence.


The BII mission is to continually deliver the most advanced expertise in information security available in the industry to help protect our customers’ digital assets from a growing spectrum of malicious attacks. To achieve this goal we recruit top talent from the information security community and encourage fresh ideas.