What is Vulnerability and Penetration Testing [VA/PT]?
Click here to watch a 3-minute animation.
Why do I need Vulnerability and Penetration Testing [VA/PT]?
Click here to watch a 6-minute animation.
An External Assessment will perform the following CVE & OWASP tests against a public facing IP Asset
Based on the industry requirements the external assessment will use one or more of the NIST, OWASP, GDPR, PCI-DSS and SWIFT Risk management Frameworks using the CSM, CVE & KPR references
An Internal Assessment will perform the following CVE & OWASP tests against a private network IP Asset performed from within the network
Based on the industry requirements the internal assessment will use one or more of the NIST, OWASP, GDPR, PCI-DSS and SWIFT Risk management Frameworks using the CVE & KPR references
A Web Application Assessment will perform the following OWASP testing, API checks and Coding Best Practices.
The latest top 10 OWASP are:
Based on the industry requirements the Web Application Assessment will use one or more of the OWASP, GDPR, PCI-DSS, HIPAA and SWIFT Risk Management Frameworks
The Social Engineering assessment first scans all publicly available data sources to build a picture of your Company's publicly exposed data. Press releases, company and private social media are examined for exploitable resources.
Once a baseline is established, a phishing campaign is crafted to test your Company resilience to these attacks either as a one off, semi or annually.
Industry best practices for Social Media usage, DNS configuration and DMARC / DKIM email practices are used as the reference frameworks.
While a user convenience for access and mobility, wireless is one of the most susceptible communications methods and protocols.
A wireless assessment is performed covering:
Industry best practices for creating a Trusted Wireless Environment (TWE) and DNS configuration are used as the risk frameworks along with CVE & KPR reference frameworks.
The Physical assessment can cover a multitude of areas including
ISO 27000 and 14000 series standards are used as the reference frameworks for the analysis.
Using your Company name and domains / websites, the Deep Web data sources and Dark Web marketplaces are searched for your domain, tradename and personnel associated data including password and credit card breaches
Once established and immediately remediated, this is a continuous monitoring service for 12 months, until terminated with immediate notification of any future risks