Security Assessment Review entry points Design perimeter coverage Identify areas of concern Identify areas that should have restricted access Identify areas that are “hidden” (out of view) Written report of our findings X/TwitterThis field is for validation purposes and should be left unchanged.Name* Company*Email* PhoneNotes Δ