Skip to main content
Hit enter to search or ESC to close
Close Search
search
Menu
about
about recon
our story, our philosophy, our values + our team
our story
why recon
our values + philosophy
team recon
careers
services
recon services
recon helps clients face and continuously adapt to the threats of cyber security through our three service approaches.
Consulting services
Security Assessments
vCISO
Risk management
Architecture design
Penetration Testing Checklist
professional services
Technology deployment
Technology upgrades/migrations
Technology + security training
Integration + customisation
managed services
Managed security controls
Analysis + triage
Incident management
data sovereignty
innovations
recon ai
vendors
resources
news
articles
Checklists
penetration testing checklist
podcasts
policies
contact
search
Architecture design
Historically, cyber security controls have been an afterthought when deploying/upgrading or updating applications and servers.
Nowadays, customers are asking recon to assist their Application and ICT teams to bake cyber into the build of their operational systems.
Included in every deployment
Project Management
Living documentation
SOP manuals
Internal testing (recon-Lab)
SERVICE
Architecture design
cyber consulting services
security assessment
vCISO
Risk management
Architecture design
next
Share
Tweet
Share
Close Menu
about
about recon
our story, our philosophy, our values + our team
our story
why recon
our values + philosophy
team recon
careers
services
recon services
recon helps clients face and continuously adapt to the threats of cyber security through our three service approaches.
Consulting services
Security Assessments
vCISO
Risk management
Architecture design
Penetration Testing Checklist
professional services
Technology deployment
Technology upgrades/migrations
Technology + security training
Integration + customisation
managed services
Managed security controls
Analysis + triage
Incident management
data sovereignty
innovations
recon ai
vendors
resources
news
articles
Checklists
penetration testing checklist
podcasts
policies
contact