In an environment where remote working is becoming increasingly common, it is important to weigh the benefits against the risks. If your networks are compromised, how far can an attacker get? What systems or data might they access?
Prioritize specific systems and assets to target, where we will assess:
Download the full service description
At the end of the test, you will receive a comprehensive report broken down into:
High-level, non-technical summary of your business’s risks.
Detailed description of the methodologies followed and the scope of testing.
Overview, consultant’s commentary, and detailed descriptions of each technical vulnerability identified, with remediation advice.
Download the full service description
This test will be performed using IT Governance’s proprietary security testing methodology, which is closely aligned with the SANS, OSSTMM (Open Source Security Testing Methodology Manual), and OWASP (Open Web Application Security Project) methodologies.
The tester will attempt to compromise two or three of your most important systems, as chosen by you or with help from our expert. Based on your needs, we will identify a set of objectives (e.g. determining what level of access an attacker could gain) or scenarios (e.g. the impact of a phishing attack or an attacker exploiting leaked credentials) for testing.
This service is suitable for most organizations that use remote access solutions such as VPNs (virtual private networks) and remote desktop software.
Prices start from $8,300.
Identify and understand the technology-related vulnerabilities affecting your web applications and APIs, and the business impacts these present.
Demonstrate a strong security posture to clients by providing third-party assurances that your web applications and APIs are secure.
From the detailed report, you will be able to implement security measures (such as strong authentication and session management controls, and keeping untrusted data separate from commands and queries), thereby reducing the likelihood of a security breach while protecting your brand.
Supports compliance with ISO 27001, the GDPR (General Data Protection Regulation), the PCI DSS (Payment Card Industry Data Security Standard), and other laws, regulations, and contractual obligations.
Throughout the engagement, our expert consultant will provide you with updates from both technical and non-technical perspectives.
Our established penetration testing team has amassed extensive testing experience that ensures clients receive a comprehensive service.