As trusted partners of the Scottish Business Resilience Centre and a certification body for the NCSC’s Cyber Essential Scheme, you have the confidence that our services meet industry standards.
The core approach to protecting your network from cyber-attacks is to get a reliable and experienced company dealing in Cyber security services suited for your organization.
Closed Door Security stands as a leading brand in offering services of Cyber security, including:
Red Team Assessments
Penetration Testing
Security Assessments
Cyber Essentials
Cyber Essentials Plus
IASME Gold
Security Consulting
Managed Security
As the first business within the Islands of Scotland to be awarded with the status of certification body by the NCSC, we are setting the standard for satisfaction in delivering these services.
At Closed Door Security, we offer a wide range of security testing services. We ensure that our testers are trained in a speciality before they are able to deliver it. This means our customers can be sure that their tester is an expert in the field they are examining. We perform the following types of testing:
At Closed Door Security, we offer a wide range of security testing services. We ensure that our testers are trained in a speciality before they are able to deliver it. This means our customers can be sure that their tester is an expert in the field they are examining. We perform the following types of testing:
Red Teaming
Web Application
Mobile Application
Infrastructure
Build Reviews
Assumed Compromise Scenarios
Contact:
William Wright
Contact CREST Member, Closed Door Security Ltd
Fill out your details and a member of our team will contact you shortly. "*" indicates required fields
"*" indicates required fields
Closed Door Security LtdClosed Door Security Ltd
Arrange a Closed Door Security Ltd Call Back
Fill out your details and a member of our team will contact you shortly. "*" indicates required fields
"*" indicates required fields
Closed Door Security Ltd Contact Details
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.