# Lorikeet Security > Lorikeet Security is a cybersecurity consulting firm specializing in penetration testing, security code reviews, attack surface management, and compliance-driven security assessments. We serve startups, enterprises, fintech, healthcare, government, and AI companies globally with a real-time client portal, compliance-ready reports, and free retesting. 170+ projects completed. Based in the US with remote delivery worldwide. ## Core Pages - [Homepage](https://lorikeetsecurity.com/): Overview of Lorikeet Security's penetration testing and cybersecurity consulting services - [About Us](https://lorikeetsecurity.com/about-us): Company background, mission, and team information - [Contact](https://lorikeetsecurity.com/contact): Get in touch for security assessments and consultations - [Methodology](https://lorikeetsecurity.com/methodology): Our penetration testing methodology and approach - [Partners](https://lorikeetsecurity.com/partners): Technology and strategic partnerships - [Pricing](https://lorikeetsecurity.com/pricing): Transparent penetration testing pricing starting from $2,500 - [FAQ](https://lorikeetsecurity.com/faq): Frequently asked questions about penetration testing and cybersecurity services - [Lory](https://lorikeetsecurity.com/lory): Lorikeet Security AI Assistant ## Penetration Testing Services - [Service Areas Overview](https://lorikeetsecurity.com/service-areas): All penetration testing and security assessment services - [Web Application Pentesting](https://lorikeetsecurity.com/service-areas/web-application): OWASP Top 10 and beyond, manual testing of web apps - [API Pentesting](https://lorikeetsecurity.com/service-areas/api-pentesting): REST, GraphQL, and SOAP API security testing - [Cloud Pentesting](https://lorikeetsecurity.com/service-areas/cloud-pentesting): AWS, Azure, GCP cloud infrastructure security assessments - [Active Directory Pentesting](https://lorikeetsecurity.com/service-areas/active-directory): AD enumeration, privilege escalation, and domain compromise testing - [Network Pentesting](https://lorikeetsecurity.com/service-areas/network-pentesting): Internal and external network penetration testing - [Mobile App Pentesting](https://lorikeetsecurity.com/service-areas/mobile-app-pentesting): iOS and Android mobile application security testing - [Social Engineering](https://lorikeetsecurity.com/service-areas/social-engineering): Phishing simulations and social engineering assessments - [Red Teaming](https://lorikeetsecurity.com/service-areas/red-teaming): Full-scope adversary simulation and red team operations - [Physical Pentesting](https://lorikeetsecurity.com/service-areas/physical-pentesting): Physical security assessments and facility penetration testing - [Wireless Pentesting](https://lorikeetsecurity.com/service-areas/wireless-pentesting): Wireless network security testing - [Container & Kubernetes](https://lorikeetsecurity.com/service-areas/container-kubernetes): Container and Kubernetes security assessments - [Blockchain Audit](https://lorikeetsecurity.com/service-areas/blockchain-audit): Smart contract and blockchain security auditing - [IoT & Hardware](https://lorikeetsecurity.com/service-areas/iot-hardware): IoT device and hardware security testing - [Thick Client](https://lorikeetsecurity.com/service-areas/thick-client): Desktop application and thick client security testing - [ATM Pentesting](https://lorikeetsecurity.com/service-areas/atm-pentesting): ATM and kiosk security assessments ## Compliance Testing - [Compliance Overview](https://lorikeetsecurity.com/compliance): All compliance-driven penetration testing services - [SOC 2 Pentesting](https://lorikeetsecurity.com/compliance/soc2-penetration-testing): SOC 2 Type II penetration testing and compliance - [PCI-DSS Pentesting](https://lorikeetsecurity.com/compliance/pci-dss-penetration-testing): PCI-DSS compliance penetration testing - [HIPAA Pentesting](https://lorikeetsecurity.com/compliance/hipaa-penetration-testing): HIPAA security rule penetration testing - [ISO 27001 Pentesting](https://lorikeetsecurity.com/compliance/iso-27001-penetration-testing): ISO 27001 compliance security assessments - [CMMC Pentesting](https://lorikeetsecurity.com/compliance/cmmc-penetration-testing): CMMC compliance penetration testing for defense contractors - [GLBA Pentesting](https://lorikeetsecurity.com/compliance/glba-penetration-testing): GLBA compliance penetration testing for financial institutions - [CIS Pentesting](https://lorikeetsecurity.com/compliance/cis-penetration-testing): CIS Controls compliance security assessments ## Managed Services - [Attack Surface Management](https://lorikeetsecurity.com/service-areas/asm): Continuous external attack surface monitoring and management - [Vulnerability Management](https://lorikeetsecurity.com/service-areas/vulnerability-management): Ongoing vulnerability scanning and management - [SOC as a Service](https://lorikeetsecurity.com/service-areas/soc-as-a-service): Managed security operations center - [Patch Management](https://lorikeetsecurity.com/service-areas/patch-management): Managed patch management services ## Industries - [Industries Overview](https://lorikeetsecurity.com/industries): Industries we serve with cybersecurity services - [SaaS & Startups](https://lorikeetsecurity.com/industries/saas-startups): Security for SaaS companies and tech startups - [Healthcare](https://lorikeetsecurity.com/industries/healthcare): Healthcare and medical device cybersecurity - [Fintech](https://lorikeetsecurity.com/industries/fintech): Financial technology security testing - [E-Commerce](https://lorikeetsecurity.com/industries/ecommerce): E-commerce platform security assessments - [Government](https://lorikeetsecurity.com/industries/government): Government and public sector cybersecurity - [AI Startups](https://lorikeetsecurity.com/industries/ai-startups): AI and ML application security testing - [VC Portfolios](https://lorikeetsecurity.com/industries/vc-portfolios): Portfolio-wide security assessments for venture capital firms - [Crypto & Web3](https://lorikeetsecurity.com/industries/crypto-web3): Cryptocurrency and Web3 security testing - [Insurance](https://lorikeetsecurity.com/industries/insurance): Cyber insurance compliance testing ## Locations - [Locations Overview](https://lorikeetsecurity.com/locations): Service areas and office locations - [New York](https://lorikeetsecurity.com/locations/new-york): Penetration testing services in New York - [Miami](https://lorikeetsecurity.com/locations/miami): Penetration testing services in Miami - [Orlando](https://lorikeetsecurity.com/locations/orlando): Penetration testing services in Orlando - [San Francisco](https://lorikeetsecurity.com/locations/san-francisco): Penetration testing services in San Francisco - [Los Angeles](https://lorikeetsecurity.com/locations/los-angeles): Penetration testing services in Los Angeles - [Toronto](https://lorikeetsecurity.com/locations/toronto): Penetration testing services in Toronto ## Blog - [Blog](https://lorikeetsecurity.com/blog): Cybersecurity insights, guides, and industry analysis - [SOC 2 vs ISO 27001 for Startups](https://lorikeetsecurity.com/blog/soc2-vs-iso-for-startups): Comparison guide for startup compliance choices - [Security After Pre-Seed](https://lorikeetsecurity.com/blog/security-after-pre-seed): Security priorities for early-stage startups - [Startup Security Before Series A](https://lorikeetsecurity.com/blog/startup-security-before-series-a): Essential security checklist before fundraising - [AI-Built Apps Wide Open](https://lorikeetsecurity.com/blog/ai-built-apps-wide-open): Security risks in AI-generated applications - [AI Generated Code Security](https://lorikeetsecurity.com/blog/ai-generated-code-security): Security implications of AI-assisted development - [Choosing a Cybersecurity Vendor](https://lorikeetsecurity.com/blog/choosing-cybersecurity-vendor): Guide to selecting a penetration testing provider - [Code Review vs Pentest](https://lorikeetsecurity.com/blog/code-review-vs-pentest): When to choose security code review vs penetration testing - [SOC 2 Pentest Requirements](https://lorikeetsecurity.com/blog/soc2-pentest-requirements): What SOC 2 requires for penetration testing - [Vulnerability Scanning vs Penetration Testing](https://lorikeetsecurity.com/blog/vulnerability-scanning-vs-penetration-testing): Key differences between scanning and manual testing ## Contact - Email: sales@lorikeetsecurity.com - Support: support@lorikeetsecurity.com - Partnerships: partnerships@lorikeetsecurity.com - Website: https://lorikeetsecurity.com