HOW VULNERABLE IS YOUR IT?
Our OSCP certified ethical hackers will kick-start the work for you. With a so-called pen test they will find the vulnerabilities in your website, application, ICT infrastructure or mobile apps.
We identify the research question for the pen test and the correct scope with you. Part of this scope for the intrusion test is the depth that our pen testers use.
- With a black box test we investigate which vulnerabilities the pen tester can abuse without any prior knowledge.
- In a grey box test, the ethical hacker has the same access rights as a regular user of the system.
- With a white box test we also investigate the source code and configuration of your systems.
The result of a pen test is crystal clear reporting. We define the detected vulnerability risk by using the CVSS 3.0 method. This makes the results measurable and helps you to prioritise the results.
In addition, we provide a detailed description with every detection, which enables your specialists to reproduce them. Finally, we provide good advice with every finding to repair the weakness.
We present the results of the pen test in person. That way, you can be sure that all your questions have been answered. This ensures that you can apply the recommendations.
PENETRATION TESTING AS A SERVICE
You can perform a one-off intrusion test or intermittent tests. We help you to set up an intrusion test process that best fits your situation. We implement a well-organised process for you for a fixed monthly fee.
We also help you with pen tester training courses for your own people if you want. Have a look at our training courses.
With our 360-degrees approach to information security, you ensure that your information is always properly secured. We translate abstract risks into concrete and applicable steps in your business practice.
Gaining insight into the vulnerabilities in your ICT environment? Contact us for an intake interview without obligation.