For Internet-accessible devices and services such as web servers, firewalls, routers. DNS, remote access, etc. read more
For internal servers, firewalls, routers and switches, email and DNS services.
For your wireless infrastructure, including access points, controllers, firewalls, etc. read more
For all other types of infrastructure or devices,send us your requirements and we will tailor a custom assessment for your environment. contact us
The term "penetration testing" is often used interchangeably with network security assessment. In most cases though, the purpose of a penetration test is to focus on a very specific set of computer systems or networks. An external pen test, targets an organization's public IP address space, such as externally visible web servers, DNS servers, e-mail servers, and firewalls. The objective is to determine if an external hacker can infiltrate the network and then see if they could then go on to gain further unauthorized access to internal systems or confidential data,
In the case of internal penetration testing, a security engineer connects to your internal network and attempts to gain unauthorized access to sensitive organizational resources. In an internal pen test, the security engineer is network level connected but has no other credentials, such as a user account on the domain or on a corporate software application.
By contrast, network security assessments generally refer to a broader, more encompassing scope or work that may include an external penetration test and/or an internal penetration test, as well as other security assessments such as web application, wireless, mobile, and policy reviews.