We have updated our Privacy Policy 800.408.9663 My Account

    Security

    Security Penetration Testing

    Better protect your business by identifying vulnerabilities

    Take the first tactical step by identifying vulnerabilities in your IT environment. Our security professionals use proven techniques and tools to help you evaluate your technical, administrative, and management security controls, and conduct tests against your security perimeter using real-world techniques.

    To fully secure your business, we offer three types of testing. External testing will simulate an outside attacker's attempts to breach your network security perimeter. The internal test attempts to escape out of network boundaries and gain unauthorized access to systems. And website application testing attempts to gain unauthorized access to systems connected to the web application.

    Professional Level

    • Automated Security Scanning: Commercial scanning tools used to identify potential vulnerabilities
    • Report Development and Interpretation: Analyze results and remove false positives

    Enterprise Level

    • Automated Security Scanning: Commercial scanning tools used to identify potential vulnerabilities
    • Report Development and Interpretation: Analyze results and remove false positives
    • Network Architecture Review: Review network security design and identify weaknesses
    • Manual Exploit Testing: Perform manual in-depth testing techniques to validate weaknesses
    • Security Policy Review: Review up to five security policies for gaps in procedures

    Enterprise + Level

    • Automated Security Scanning: Commercial scanning tools used to identify potential vulnerabilities
    • Report Development and Interpretation: Analyze results and remove false positives
    • Network Architecture Review: Review network security design and identify weaknesses
    • Manual Exploit Testing: Perform manual in-depth testing techniques to validate weaknesses
    • Security Policy Review: Review up to five security policies for gaps in procedures
    • Automated Security Re-Scan (within three months): Re-scan identified systems after patches are put in place
    • Black Box Testing: Perform system identification without prior knowledge from the client on devices

    Request an Assessment

    Take the first tactical step by identifying vulnerabilities in your IT environment. Our security professionals use proven techniques and tools to help you evaluate your technical, administrative, and management security controls, and conduct tests against your security perimeter using real-world techniques.