Security Assessment | Monitoring. Mitigation | Professional Services | Security Team as a Service
Penetration testing
Identify security weaknesses before hackers do
The benefits for your organisation:
__ Identification of vulnerabilities and risks in your web/mobile applications and networking infrastructure
__ Detailed remediation steps to detect existing flaws and prevent future attacks Validation of the effectiveness of current security safeguards
Penetration testing, also called pen testing or ethical hacking, is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit. The main objective of penetration testing is to identify security weaknesses.
Penetration testing can also be used to test an organization's security policy, its adherence to compliance requirements, its employees' security awareness and the organization's ability to identify and respond to security incidents.
Organizations should perform pen testing regularly -- ideally, once a year -- to ensure more consistent network security and IT management.
Targeted testing
is performed by the organization's IT team and the penetration testing team working together. It's sometimes referred to as a "lights turned on" approach because everyone can see the test being carried out.
External testing
targets a company's externally visible servers or devices including domain name servers, email servers, web servers or firewalls. The objective is to find out if an outside attacker can get in and how far they can get in once they've gained access.
Blind testing
simulates the actions and procedures of a real attacker by severely limiting the information given to the person or team performing the test beforehand. Typically, the pen testers may only be given the name of the company. Because this type of test can require a considerable amount of time for reconnaissance, it can be expensive.
Detailed reports
You get a detailed report with C-level overview and detailed information for scanned assets, used scan methods, tests results and remediation recommendations.