World Map

 

Foregenix are global specialists
in digital forensics and information security

From our headquarters in the United Kingdom and offices in North America, Germany, South Africa and Latin America, we offer a global service delivery capability serving clients in all corners of the world

Download the Guide to Incident Response Planning Incident Readiness: Plan while you still have time.

 

Services

Built on a solid reputation of trust and reliability, Foregenix are forerunners in information security; simplifying the compliance process and ensuring payment environments are secure.

Compliance

✔ PCI DSS
✔ PCI P2PE
✔ PCI PIN
 
Learn More
 

Digital Forensics & Incident Response

✔ Forensic Investigations
✔ PFI & PFI Lites
✔ Incident Response Planning
 
Learn More
 

Penetration Testing

✔ Network Penetration Testing
✔ Mobile App Testing
✔ Application Penetration Testing
 
Learn More
 

Baked-In Security

After investigating some of the biggest breaches in the world, we have developed a range of cyber security solutions. Simple, effective and low maintenance, our security solutions "Bake Security In" to our clients' businesses - taking care of the dangers of cyber security, so you can get on with your day to day.

Website Security: FGX-Web

✔ 360° Website Protection
✔ Specialist Website Security Support
✔ FGX-Web Protect and Managed Services options
 
Learn More
 

POS Security: FGX-Store

✔ Serengeti 
✔ FScout Data Discovery
✔ Managed Firewall 
 
Learn More
 

Has your business been hacked?

If you suspect that your systems have been compromised in any way,
or if you'd like us to perform an urgent audit,
please call us immediately:

Or email us via:
info@foregenix.com

Foregenix Recent Blogs

Vulnerabilities on ManageEngine EventLog 10.7 through 11.2 (Service Pack 11023)

We have come across Manage Engine EventLog installations a few times in our penetration tests at Foregenix, and have identified different vulnerabilities in our attempts to compromise it. In most situations a default guest account was left open and becomes a focus point as we attempt to use it to elevate privileges or otherwise influence the profiles behaviour to our advantage. These attempts resulted in the following vulnerabilities being discovered and reported to the vendor. While the...Learn More