Penetration Testing

Cyber criminals have specific goals – whether it’s obtaining your valuable corporate information, attempting to effect maximum public embarrassment, stealing data, or exposing confidential information. How vulnerable is your company to a dedicated, well-resourced cyber-attack? Would your organization’s network defenses stand up to a hacking attempt? Have you considered that there may be unknown or undocumented points of access into your network?

How We Help You

Our penetration testing service covers both the broad security issues exploited by automated or low-level attacks. We simulate a dedicated attack, testing the defenses at the Internet gateway and within the network. We will provide you with an executive report outlining all vulnerabilities identified, the risks they pose, their impact on your business, and recommendations for remedial action.

A Different Approach

Our knowledge leaders go beyond basic presence penetration tests. We spend more time on network research, analysis of your web server and applications, as well as run vulnerability scans within your network (behind the firewall). Our executive summaries are designed for a non-technical audience, are cost-effective, and alert you to business risk by priority.

All Penetration Tests Are Not Equal

The potential impact of security breaches is high. Most penetration testing services scan and test your network’s Internet Point of Presence, which is your public gateway to the world-wide web. These tests are useful in that they provide a “snapshot” of your current vulnerability to basic attacks. What they do not do is tell you whether you have unknown and undocumented points of access to the Internet.

A good penetration test must also alert you to vulnerabilities from attackers on the inside or 3rd party vendors. Over sixty percent of organizations that report incidents have suffered internal attacks.

What to Expect from Penetration Testing

We will check publicly-available information about your network addresses and IT deployments that could be compromised by a potential attacker. In addition, we:

  • Scan by appointment, testing but not causing damage or disruption to your systems
  • Confirm the existence of vulnerabilities, and leverage them to uncover unknown paths into the network.
  • Provide you with analysis and reporting that identify the vulnerabilities, examine findings, and document conclusions and business impacts