Penetration Testing Services

Black, White, Grey - Stopping an attacker means thinking the way they do and actively predicting methods of attack. Our Penetration Test team of ethical hacking experts are well versed in the most current attack methods. Penetration Test is performed to demonstrate an attack and determine the likelihood of a hacker to penetrate different parts of your organization via wired and wireless networks, Web Applications, Cloud based applications, mobile applications & devices and via your users. During Pen Test, our ethical hacking team work to expose and safely exploit any vulnerable areas, demonstrating to your organization exactly what might occur should you end up in the sights of a hacker.

Our Pen Test team will perform both Internal and External Penetration Test with or without infrastructure details provided by your organization.

  • Internal & External Web Applications
  • Internal & External Servers
  • Internal & External Devices (Routers, Switches, IPS, IDS, Firewall, Load Balancer, Wireless Controllers)
  • Wired & Wireless Network
  • Mobile Applications
  • Cloud
  • Physical Premises
  • Social Engineering (Employees, Vendors, Contractors, etc)

Advisory Service - Our Advisory Services are designed to assist organizations with Executive Management Decisions surrounding information security as well as assist the IT Team in Designing and Implementing a secure infrastructure. We become part of your information security team by understanding your core business, infrastructure, and your digital initiatives and align these strategies and initiatives to develop an information security road map and walk hand-in-hand in implementation.

Firewall, IPS, IDS. DMZ Ruleset Review

Without the proper specific rules on networked security devices, an organization may be letting in (and out) the wrong traffic. A Firewall, IPS, IDS, DMZ rule set review is a line by line analysis of each rule/configuration on the target device. Without negatively impacting the business processes, our consultants review your organization's Perimeter and Internal defense rule set and help build proper rules to be sure that your organization is conforming to security best practices.

Physical Security Review

Physical Security reviews test physical security procedures and are essential to building a complete information security program. With Physical Security surfacing as a requirement for many compliance initiatives, organizations can no longer overlook this important security aspect. If an attacker can physically walk in a building to take the desired data, then there is no need for them to hack into the organization's server.

Network Architecture Review

A Network Architecture Review is a detailed analysis of current network architecture. Our consultants perform a Network Architecture Review for your organization to determine the areas where you are lacking in information security, as well as help to design a new, more secure architecture. The steps we take include: Gather Documentation / Network Topology / Interview System Owners / Review Configurations as needed / Document Enhancements / Deficiencies.

WEB FOCUS VPROC VTOUCH CYBER SECURYTY