Untitled Document

Penetration Testing

What is it?

Security vulnerabilities can occur as a result of poor or improper system configuration, known and unknown hardware or software flaws, or operational weaknesses in process. A penetration test identifies these vulnerabilities and allows you to eradicate them.

Why you need it

Access to information on demand is a business necessity and ensures continuity and efficiency in operations.

How it works

An active analysis of the system is undertaken from the position of a potential attacker and can involve active exploitation of any security vulnerabilities identified. A report of the issues and an assessment of their impact with mitigation recommendations are usually provided.

Services provided include manual vulnerability assessment with additional exploitation and DOS testing if required, Application Testing, Wireless Testing, Internal Testing.

All reports provided contain vulnerability types, severity and remediation instructions.