Validate internal and/or external security controls, including protections around high-value systems. Manual testing that simulates current threats, including pivoting and post exploitation.
This service focuses on your entire network and computer systems, testing each device for known vulnerabilities. The end result will be a detailed report which classifies the threat level of each vulnerability found from high to low.
Our tools will crawl your application looking for SQL injection, Cross Site Scripting (XSS), local file inclusion, remote file inclusion, unvalidated redirects, backup file disclosure, and many other vulnerabilities. This is a thorough test of your application's security and can take several days to complete. Once completed, a detailed report will be generated describing each vulnerability found.
Phishing Security is a toolkit which provides an opportunity to combine phishing test emails with security awareness education.