About

Ammonites are ancient extinct cephalopods that are often used as a visual representation of the golden ratio. This resonates at Ammonite Tech because we strongly believe in a natural synergistic balance to how IT is designed and implemented. There are many systems to solve a multitude of problems. Some problems require a simple solution while others are complex. Nature always choses the sustainable and balanced approach to resolve problems. At Ammonite Tech this means providing a focused approach keeping in mind costs, manageability and effectiveness. Ammonite Tech provides a golden ratio approach to IT and Cyber Security Consulting.

Services

Let years of IT and Cyber Security experience give you a helping hand. Professional, personable and diligent are just a few of the many attributes you will come to expect from Ammonite Tech consultants. Let Ammonite Tech help your business establish and implement an effective security project with confidence.

    Application Security
      Vulnerability Assessments
      Common Vulnerability Enumeration (CVE)
      Common Vulnerability Scoring System (CVSS)
      Common Weakness Enumeration (CWE)
      Penetration Testing
      Binary Analysis
      Dynamic Application Security Testing (DAST)
      Static Application Security Testing (SAST)
      Source code Bill of Material (BoM)
      Binary Reverse Engineering
      Custom analysis toolchain development
      Reporting
    Security Breaches
      Malware Reverse Engineering
      Common Vulnerability Enumeration (CVE)
      Common Vulnerability Scoring System (CVSS)
      Vulnerability Analysis
      Incident Management
      Log Analysis
      Forensics
      Reporting
    Network and System Security
      Network Intrusion Analysis
      Firewall rule development
      Vulnerability Assessments
      Penetration Testing
      Equipment deployment
      OS Hardened deployment
      Building customized hardware builds for specialized tasks
      Troubleshooting
      Cabling
      Reporting
    Virtualisation
      All major virtualisation technologies
      All major Container technologies
      Design/Development/Deployment

Contact

For all inquiries please feel free to contact Dan Bastianello using the contact details below.