Security Assessment

PENETRATION TESTING, VULNERABILITY ASSESSMENT, INFORMATION SECURITY AUDIT

Security Assessment

PENETRATION TESTING, VULNERABILITY ASSESSMENT, INFORMATION SECURITY AUDIT

Penetration test

Pentest – simulation of an attack from the perspective of a potential attacker (hacker or insider) to detect and exploit found vulnerabilities in networks, software, WEB sites, physical perimeter or in the overall organization of security processes.

Gives you understanding:

  • What is the real business risk of the company and its owners from the gaps present in the protection of information systems and security processes?
  • Are your business processes and information systems adequately protected from hackers, insiders and accidental security incidents?
  • What information can hacker access, modify, or block, which hacking tactics to apply?
  • Will the company notice the hacking attempt and will respond correctly?

Basics of our work

50+

Full-scale penetration tests since 2009

20

The average duration of the penetration test (from 15 to 40 working days)

10 000$

The average price of a penetration test ($ 4,000 – $ 20,000)

80+

Years of experience in penetration tests of our experts (9 – as a company)

Who we work with

Our approach

We speak the language of business, describing business risk in the most simple and understandable for management form.

Threat Profiling – analysis of what a hacker from the Internet, an insider, a guest, a remote access partner or other specific threat can do

We use generally accepted and our methods to reduce false negative

Each of our experts has from 1 to 6 certificates in the field of information security and technical audits.

Transparency and the possibility of full control over the project in real time

We check EVERY potential vulnerability and all likely hacking scenarios with expert conclusions and recommendations

Our certificates

Our tools

Methodologies and practices used

How we are working

01

You fill out the questionnaire on this page, we may further clarify the task

02

We send you a commercial offer and reporting examples

03

Sign a non-disclosure agreement

04

Sign the contract

05

Approve the test plan and methodology

06

Start – the passive information gathering and documentation study

07

Active reconnaissance

08

dentification of vulnerabilities (scanning and manualy)

09

Check every vulnerability. Risky – by agreement

10

Risk assessment, threat profiling, report writing

11

Report presentation

12

Re-verification after eliminating vulnerabilities

Report structure

Want a sample report?

Do you have questions, comments or suggestions ? Write to us and we will answer you as soon as possible.

 





Order service

To order services, please fill out a questionnaire - select the services you are interested in and give answers to additional questions, and we will send you a commercial offer.

* Fields are required

Vulnerability scanning

Penetration test

    • This field is required.
    • This field is required.
    • This field is required.
    • This field is required.
    • This field is required.
    • This field is required.

  • This field is required.

Additional services

    • This field is required.

Overview Размер файла не должен превышать 10мб.

General issues

  • This field is required.