Better protect your business by identifying vulnerabilities
Take the first tactical step by identifying vulnerabilities in your IT environment. Our security professionals use proven techniques and tools to help you evaluate your technical, administrative, and management security controls, and conduct tests against your security perimeter using real-world techniques.
To fully secure your business, we offer three types of testing. External testing will simulate an outside attacker's attempts to breach your network security perimeter. The internal test attempts to escape out of network boundaries and gain unauthorized access to systems. And website application testing attempts to gain unauthorized access to systems connected to the web application.
Professional Level
- Automated Security Scanning: Commercial scanning tools used to identify potential vulnerabilities
- Report Development and Interpretation: Analyze results and remove false positives
Enterprise Level
- Automated Security Scanning: Commercial scanning tools used to identify potential vulnerabilities
- Report Development and Interpretation: Analyze results and remove false positives
- Network Architecture Review: Review network security design and identify weaknesses
- Manual Exploit Testing: Perform manual in-depth testing techniques to validate weaknesses
- Security Policy Review: Review up to five security policies for gaps in procedures
Enterprise + Level
- Automated Security Scanning: Commercial scanning tools used to identify potential vulnerabilities
- Report Development and Interpretation: Analyze results and remove false positives
- Network Architecture Review: Review network security design and identify weaknesses
- Manual Exploit Testing: Perform manual in-depth testing techniques to validate weaknesses
- Security Policy Review: Review up to five security policies for gaps in procedures
- Automated Security Re-Scan (within three months): Re-scan identified systems after patches are put in place
- Black Box Testing: Perform system identification without prior knowledge from the client on devices
Request an Assessment
Take the first tactical step by identifying vulnerabilities in your IT environment. Our security professionals use proven techniques and tools to help you evaluate your technical, administrative, and management security controls, and conduct tests against your security perimeter using real-world techniques.