We provide a detailed report outlining potential vulnerabilities such as security holes, patch levels, router configuration issues, and other potential problems within networks and applications. The report also includes proven and trusted recommendations and strategies to close any identified security gaps from our analysis. This report is limited to port scanning and intelligence gathering only.
We deliver a more in-depth test that identifies how deep the vulnerabilities may go and determines whether the vulnerabilities are viable and, if so, the level of threat they represent to your company’s network. Also known as White and Black box penetration testing. Identifying the vulnerability is the first prevention mechanism before recommendations can be made on how to plug the holes. This assessment can also be performed on wireless networks, data, and social engineering (both physical and remote). Social engineering penetration testing covers aspects such as mail phishing, email malware and employee manipulation.