Penetration Testing (External/Internal)
order
ABOUT SERVICE
Scope of work:
  • Reconnaissance (obtaining a map of domain names and IP addresses)
  • Analysis for vulnerabilities in network services and applications
  • Exploitation of vulnerabilities, gaining persistent access, post-exploitation
Result:
  • The fact and possibility of penetration, as well as a description of confidential information that might be compromised
  • Description of compromise scenarios and vulnerabilities involved in attacks
  • Recommendations for eliminating vulnerabilities
Factors
Organization stores Personally Identifiable Information and other critical information, the compromise of which would negatively affect on the image of the company
Carried out after vulnerability assessment and the level of cyber security must be above average
Recommended to carry out at least once a year for the entire infrastructure
CONTACT US

Leave the application below, and our specialists will quickly orient you on prices and details of works

GDPR Agreement *