Penetration Testing

A penetration test determines how well your organisation’s security policies protect your assets. We try to gain access to your network and information assets in the same way a malicious hacker would, with tests that range from an overview of the security environment to attempted a “hack” with the intent of obtaining investigative information.

In simple terms our “Pen Test” examines any weaknesses in the IT infrastructure of your corporation by trying to discover and exploit them, in a safe manner. These vulnerabilities can be found in the software itself at these particular points of entry:

  • Backdoors in the Operation System
  • Unintentional flaws in the design of the software code
  • Improper software configuration management implementation
  • Using the actual software application in a way it was not intended to be used

Our Penetration Testing can done either through a manual process or automated process and often targeted towards the following endpoints:

  • Servers
  • Network Endpoints
  • Wireless Networks
  • Network Security Devices (incl. Firewalls, Routers, IDS etc.
  • Mobile and Wireless Devices
  • Other areas of exposure, such as that of software applications and it’s code.

Our penetration testing does not stop here; Our primary goal is to go as far and deep as possible into your IT infrastructure and to get to your electronic data (assets) of your organisation.

New item
Penetration testing is an essential feature that we perform on a regular basis for securing the functioning of your organisation systems. In addition to this, Penetration tesing should be performed whenever −
  • Our system discovers new threats by attackers.
  • Adding new network infrastructure.
  • Relocating your office.
  • Setup of a new end-user program or policy.
IT Security Can Be Complicated - We Can Help

Information Security is our Primary Business.

Security should be treated with a holistic approach. Organisations only assessing the security of their servers run the risk of being targeted with client-side attacks exploiting vulnerabilities in software like web browsers, pdf readers, etc.