Reconnaissance Security Services

Penetration Testing

Penetration testing subjects a network to real-world cyber-attack scenarios and provides an evaluation of organizational defenses; exploits identified weaknesses.

Goal

Determine whether an attacker can penetrate the organization and escalate privileges and determine defenses needed; Identify recommendations.

Process

Internal/external attempts to exploit as many vulnerabilities and configuration issues as possible, and attempt to gain privileged access to execute commands.

Outcome

Identifies:

  • Vulnerable and exploitable network devices & remediation actions
  • Organizational defense posture

Vulnerability Scanning/Web App

Identifies hosts/networks at risk and recommended fixes. Web application scanning and source code review identify weak code and insecure implementation.

Goal

Identify and quantify hosts/network devices subject to risk due to vulnerabilities or system configuration weaknesses/issues that could result in a breach; and recommend remediation measures.

Process

Utilize scanning tools against the network devices to identify vulnerabilities; manual validation and analysis of discovered vulnerabilities.

Outcome

Identifies:

  • Network device vulnerabilities prioritized by risk ranking
  • Secure coding practice gaps
  • Ecommerce site security issues and remediation measures

Physical Security/Social Engineering

Utilizes many techniques to gain access to an organization’s facilities and/or networks and data; non-technical techniques to obtain unwitting human assistance.

Goal

Determine preparedness of facilities and staff to prevent or detect unauthorized access or confiscation of access privilege by unauthorized persons to an organization’s networks and data.

Process

Utilize a combination of phishing, pretexting and physical social engineering efforts in attempts to circumvent an organization’s security measures and identify weaknesses and vulnerabilities.

Outcome

Provides current posture of an organization’s security awareness and security policy dissemination and compliance and enforcement; identifies remediation actions.

Red Teaming/Digital Forensics

Red Teaming’s goal is to test an organization’s detection and response capabilities. Digital forensics assist incident investigation and post-breach containment.

Goal

Determine responsiveness of cyber detection and responses capabilities; Determine extent of breach and how to provide post-containment coverage and identify indicators of compromise (IOC).

Process

  • Utilize penetration testing to zero in on specific detection and response functions within an organization.
  • Provide services to obtain, preserve and examine forensic evidence related to security incidents

Outcome

  • Evaluation of an organization’s detection and response capabilities with prioritized recommendations
  • Forensics results facilitate rapid cyber investigation & Containment resolution

Get in touch

We're here to help you achieve more and do more, with less hassle.

If you have any questions or require additional information,
please use this form to let us know how we can help you today.

(855) 452-5923