top of page
IT Consulting | Online Security | Network Security | Computer Security


Trojan-1 is a protection service unique to Trojan Horse Security where all your cyber security needs are met.



When it comes to deciding what security assessment service to purchase, many companies are confused with all the options. Do they buy a Vulnerability Assessment? Penetration Test? Corporate Security Assessment? Web Application Security Assessment? The names and technical terms are similar and confusing. You just want ALL your systems tested, to know where your vulnerabilities are and how to fix them. Not only that, you want all your systems retested, without limits, and to know that by the end of the project you are secure from getting breached.

You need the TROJAN-1 service.

The TROJAN-1 service is the only comprehensive security assessment of its kind, anywhere. Our expert consultants analyze every system, every policy, every angle to give you the confidence and peace of mind you need to run your business.

Why just purchase a pen test or a vulnerability assessment with limitations on what will be tested? With the TROJAN-1 service, your company will get a complete analysis from every angle without any limitations, all for around the same price of just one service from other vendors.

The TROJAN-1 service includes the following:


  • External & Internal Penetration Test (UNLIMITED IPs)

  • Deep Website Security Analysis (UNLIMITED Websites)

  • External & Internal Vulnerability Scans (UNLIMITED IPs)

  • Firewall Analysis (UNLIMITED Firewalls)

  • Router & Switch Security Analysis (UNLIMITED Devices)

  • Server Configuration Security Analysis (UNLIMITED Servers)

  • Security Policies & Procedures Analysis (UNLIMITED Policies & Procedures)

  • Network Architecture Security Analysis (UNLIMITED Diagrams)

  • Information Security Program Analysis (UNLIMITED Analysis)

  • UNLIMITED Retesting until all vulnerabilities are remediated

  • Full report detailing both strategic executive analysis and technical recommendations

  • OPTIONAL monthly retesting and analysis looking for new vulnerabilities

  • OPTIONAL on-demand retesting of updated / upgraded systems

Contact us today to see how THS can help you...





bottom of page