top of page

Penetration testing

​

During penetration testing, we simulate an attempt at breaching your security so that you can fully appreciate the risks and the potential consequences of an intrusion. Our tests are performed by experienced penetration testing specialists who have a wealth of knowledge in diverse IT disciplines including policy, design, implementation, and development. They will examine the current state of your infrastructure to assess the resilience of your security controls and to identify all the ways that an attacker might gain unauthorized access.

​

We offer the following services:

external-pentest2

External Network Penetration Test

Objective: Identify and exploit vulnerabilities on systems, services and applications exposed to the Internet.

​

Benefit: Understand risk to assets exposed to Internet.

​

​

​

mobile-pentest

Mobile Application Assessments

Objective: Comprehensively assess the security of mobile devices and installed applications.

​

Benefit: Understand risk introduced to your organization through newly developed mobile applications or company-issued cell phones.

​

internal-pentest.jpeg

Internal Network Penetration Test

Objective: Emulate a malicious insider or an attacker that has gained access to an end user's system, including escalating privileges, installing custom crafted malware and/or exfiltrating faux critical data.

​

Benefit: Understand risk to business from a breach.

Dish Antenna

Wireless Security Testing

​

Objective: Assess the security of your deployed wireless solution, be it an 802.x, Bluetooth or others.

​

Benefit: Understand how secure your data in transit and systems communicating via wireless technology actually are.

​

application-pentest

Application Security Testing

​

Objective: Comprehensively assess web or mobile applications for vulnerabilities that can lead to unauthorized access or data exposure.

​

Benefit: Understand the security of applications that broker access to critical data.

​

Phone Call

Social Engineering

​

Objective: Assess security awareness and general security controls with respect to human manipulation, including email, phone calls, media drops, and physical access.

​

Benefit: Understand how your organization reacts to exploitation of human beings

bottom of page