PENETRATION TESTING


Is your organization prepared for an attack?

What is Penetration Testing?

Penetration testers perform assessments, interpret the results, and provide reports for the tested organization. Reports should function as a guide; providing valuable information that prompts actions.
A thorough penetration testing campaign involves social engineering, vulnerability scanning, and manual hacking of computer systems, networks, and web applications. 
View Our Infographic
W H Y   P O S I T

TYPES OF TESTING

Check out the kinds of Penetration Tests that we offer. 

Internal Vulnerability Test

Posit Security Group’s Vulnerability Assessments combine the latest industry-leading scanning engines for networks, operating systems, web servers, and web applications. The Internal Vulnerability Assessment is a detailed analysis of the Internal network. The analysis consists of deploying multiple vulnerability scanning engines to identify potential security exposures within Internet-facing systems.

External Vulnerability Test

Posit Security Group’s Vulnerability Assessments combine the latest industry-leading scanning engines for networks, operating systems, web servers, and web applications. The External Vulnerability Assessment is a focused and controlled vulnerability analysis of the external Internet presence. The analysis consists of deploying multiple vulnerability scanning engines to identify potential security exposures within Internet-facing systems.

Web Application Vulnerability Assessment

Posit Security Group approaches your web application like a hacker would, attempting to combine multiple vulnerabilities to achieve full compromise. However, this assessment goes a step beyond, as your organization will provide use cases, documentation, and credentials. This allows Posit Security Group to thoroughly assess, among other things, the business logic of the application.

Wireless Penetration Test

This assessment will evaluate risk related to potential access of your wireless network. Posit Security Group will identify access points from various areas located outside and within the facilities. A concept called “war-driving” allows attackers to use automobiles to collect sensitive information from far distances and attack key systems. Simulations utilizing war-driving, as well as performing an onsite Internal Attack and Penetration Test will be conducted. Posit Security Group’s ultimate goal is to gain access to the access points and attack internally connected systems in an attempt to gain unauthorized access to sensitive information.

Vulnerability Scanning

Vulnerability scans are a critical aspect of your organization's security strategy. They give you a point in time snapshot of your application or network security vulnerabilities. Posit uses a number of industry-standard tools to scan your environment and deliver a comprehensive report of your results. Ask a Posit representative about our application vulnerability scanning program. We employ SAST and DAST tools to scan your software code base for security defects. Let us help you integrate security into your Software Development Lifecycle. 

Find out if your organization is prepared to prevent an attack.

Call Us