Security assessment enquiry
Use this form if you represent a company or team and want to discuss a pentest, red team exercise, cloud/Kubernetes review or AI security assessment. A short, honest description is enough – we will suggest a practical scope.
Who should use this form?
Product owners, security leads, architects or founders responsible for a live or soon-to-be-live system.
Product owners, security leads, architects or founders responsible for a live or soon-to-be-live system.
What you can expect:
A short, clear reply aligning on scope, timeline and next steps. Where helpful, we can also share a sample (redacted) report.
A short, clear reply aligning on scope, timeline and next steps. Where helpful, we can also share a sample (redacted) report.
Primary email (security):
ceo@vexa-ai.tech
ceo@vexa-ai.tech
Note:
For training-only requests, please use the separate training & workshop form.
For training-only requests, please use the separate training & workshop form.