Using an agent connected to your internal environment, our consultants will discover exploitable security vulnerabilities present within the internal network environment. These activities simulate a malicious attacker and assess your current risk level.
Assuming the role of a malicious attacker from the public Internet, our consultants will identify exploitable security flaws within your external network environment. These flaws can include patching, configuration, and authentication issues.
Our detailed deliverables include Executive, Technical and Activity reports that will enable your network staff to cross reference the testing with monitoring and alerting controls. In addition, the reports provide guidance on mitigation.