Penetration Testing

Firewall
Behavior Analytics
Threat Detection
Penetration Testing
Discovery
Vulnerability Analysis
Actionable Results

Summary

Most penetration testers use the “Smash and Grab” method: rushing into your network, attempting to break, steal, dismantle, and generally wreak havoc. We don’t do that. Our team assists you in evaluating your IT security infrastructure by providing you with network vulnerability analysis, actionable results, and recommended remediation efforts for discovered issues.

Product description

Penetration Testing

Most penetration testers use the “Smash and Grab” method: rushing into your network, attempting to break, steal, dismantle, and generally wreak havoc. We don’t do that. Our team assists you in evaluating your IT security infrastructure by providing you with network vulnerability analysis, actionable results, and recommended remediation efforts for discovered issues. We use the same open source tools and manual approaches you would expect from a skilled attacker, plus you won’t see us handing you the huge 200-page stack of automated reports you might find with other security vendors. Our process includes the creativity of a real-world hacker, but also the skills to proactively help you reduce risks and strengthen your security defense.

The steps of a standard penetration test are as follows: discovery, scanning, attack, report, remediation, and retest. You are updated with our progress every step of the way. If at any point you have an issue, you can contact us 24/7.

Discovery

The first stage is a non-invasive scan of the network and hosts. The objective here is simply information gathering.

Scanning

This stage helps to establish a reference point and a direction for the rest of the engagement. Your network is scanned for vulnerabilities and a compilation of all the scans is gathered to create a custom database of assets. This is then carefully reviewed by our penetration testers.

Attack

After the initial discoveries and scan results, our pentesters manually test for a multitude of issues and attempt a variety of exploits.

Clean Up

Once the penetration test is complete and all vulnerabilities documented, our team cleans up the system and puts it back the way it was found.

Report

Upon completion, a report of our results is generated and available in your Customer Portal. In this document you will find: a list of vulnerabilities categorized into levels of severity, how the exploits were achieved, and suggestions on how to repair the issues.

Remediation

Using the results from your unique Report, we work with you to establish the best procedures to eradicate as many vulnerabilities as possible.

Retest

We conduct a second test after the issues have been resolved. Having a second look at the scope helps ensure the proper fixes are in place.

Help the seller understand how this product meets your needs
Contact name
Sales
E-mail
sales@hurricanelabs.com
Phone
888-276-4106
Location
Independence, OH, USA
Company
Hurricane Labs
Published