The principle aim is to highlight where vulnerabilities exist within your computer systems that could provide unauthorised access or that serve as an entry point into private areas of your network and to your sensitive data. We achieve this with a combination of vulnerability scanning software, the application of the latest disclosures that may affect your systems and professional manual penetration testing.
What we test
Infrastructure penetration testing applies to many areas including your internal environment, your perimeter and the cloud. It is also relevant to many technology areas from PCs and laptops to smart phones, Wi-Fi and remote access. From a hacker’s perspective, each area represents an opportunity to attack. These opportunities can be minimised by reviewing your security in the same way you would review your buildings or physical assets.
Advice to trust
Gaining a view of vulnerabilities in your infrastructure is not sufficient to make judgements regarding your business risk, to form your InfoSec strategy or to determine where to deploy your defensive solutions. Our experienced penetration testers provide consultancy and advice before, during and following an assessment to give you the necessary context so you can make effective decisions regarding the security of your infrastructure.
Our testing methodologies
We tailor penetration testing to your specific infrastructure and have developed robust yet flexible testing methodologies that will give you peace of mind.
- Scoping and planning
- Mapping and enumeration
- Automated vulnerability identification
- Vulnerability exploitation
- Post exploitation evidence
Clear and concise follow-up reporting
All assessments are followed by a comprehensive report, with both non-technical and technical descriptions, alongside recommendations for remediation. This will pass through a Quality Assurance process and then sent directly to you. The report includes:
- Executive summary
- Graphical summary
- Overview of vulnerabilities
- Technical analysis