{"id":170,"date":"2015-01-01T08:38:26","date_gmt":"2015-01-01T13:38:26","guid":{"rendered":"http:\/\/sixway.com\/wpsw\/?page_id=170"},"modified":"2015-01-01T08:38:26","modified_gmt":"2015-01-01T13:38:26","slug":"services","status":"publish","type":"page","link":"http:\/\/sixway.com\/wpsw\/services\/","title":{"rendered":"Services"},"content":{"rendered":"<p>On a high level we specialize in the following services;<\/p>\n<p><em><strong>Infrastructure Security<\/strong><\/em><\/p>\n<p>Internal Penetration Testing<br \/>\nExternal Penetration Testing<br \/>\nPhysical Security Review<br \/>\nSecure Architecture<br \/>\nPolicy Review Design<br \/>\nThird Party Reviews<\/p>\n<p><em><strong>Software Security<\/strong><\/em><\/p>\n<p>Secure Application Development<br \/>\nSource Code Review<br \/>\nMobile Application Security Assessment<br \/>\nSecure Code Design and Consulting<br \/>\nApplication Design Security Assessment<br \/>\nSecurity Standards Specification and Gap Analysis<br \/>\n3rd Party Product Security Review<br \/>\nSecure Coding Procedures for developers<br \/>\nSecurity Awareness and Training sessions for developers<\/p>\n<p><em><strong>Web Security<\/strong><\/em><\/p>\n<p>Web Services Security<br \/>\nWeb App Penetration Testing<br \/>\nSocial Engineering<\/p>\n<p><em><strong>Risk Management<\/strong><\/em><\/p>\n<p>Risk &amp; Control Management<br \/>\nSecurity Risk Assessment<br \/>\nSelf Risk Assessment<\/p>\n<p><em><strong>Incident Response<\/strong><\/em><\/p>\n<p>Data Breach &amp; Incident Response<br \/>\nCyber Crime Investigations<br \/>\nComputer &amp; Digital Forensics<br \/>\nData Recovery<\/p>\n<p>Please\u00a0do not hesitate to contact us <a title=\"Contact Us\" href=\"http:\/\/sixway.com\/wpsw\/contact\/\">HERE<\/a> for further information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On a high level we specialize in the following services; Infrastructure Security Internal Penetration Testing External Penetration Testing Physical Security Review Secure Architecture Policy Review Design Third Party Reviews Software Security Secure Application Development Source Code Review Mobile Application Security Assessment Secure Code Design and Consulting Application Design Security Assessment Security Standards Specification and Gap [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-170","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/sixway.com\/wpsw\/wp-json\/wp\/v2\/pages\/170","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/sixway.com\/wpsw\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/sixway.com\/wpsw\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/sixway.com\/wpsw\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/sixway.com\/wpsw\/wp-json\/wp\/v2\/comments?post=170"}],"version-history":[{"count":1,"href":"http:\/\/sixway.com\/wpsw\/wp-json\/wp\/v2\/pages\/170\/revisions"}],"predecessor-version":[{"id":171,"href":"http:\/\/sixway.com\/wpsw\/wp-json\/wp\/v2\/pages\/170\/revisions\/171"}],"wp:attachment":[{"href":"http:\/\/sixway.com\/wpsw\/wp-json\/wp\/v2\/media?parent=170"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}