PenTestBrochure Final .pdf

File information

Original filename: PenTestBrochure_Final.pdf

This PDF 1.4 document has been generated by Adobe InDesign CC 2017 (Macintosh) / Adobe PDF Library 15.0, and has been sent on on 18/01/2017 at 20:14, from IP address 50.255.x.x. The current document download page has been viewed 276 times.
File size: 449 KB (2 pages).
Privacy: public file

Download original PDF file

PenTestBrochure_Final.pdf (PDF, 449 KB)

Share on social networks

Link to this file download page

Document preview

Would you rather have a
trusted party or an attacker
break into your network?

We Listen. We Support. We Deliver.

We perform a penetration
test in the same way a
malicious attacker will exploit
your network.
For chain of vulnerabilities,
we do our homework and
present a best practice set of
Sometimes a simple patch
download will suffice, but
more often than not, the
solutions is more complex.

2273 County Rd. C West
Roseville, MN 55113


Phase 1


Our report provides your
network administrators with
detailed recommendations for
how to address specific findings.

To begin this assessement, our
Security Analysts will:
• Gather and analyze information
about the customer
• Thoroughly test and identify all
Internet entry points
• Prepare system target lists for the
Enumeration Phase

Phase 2

System targets identified in the
Discovery Phase are analyzed to
• Type of host (i.e. router, firewall,
web server, etc.)
• Operating system in use (including
version and patch level)

Phase 3

Automated scanning tools are used
to determine potential vulnerabilities
available to be exploited. Information
gathered in the first two phases will:
• “Tune” the scanner
• Focus its effort
• Improve its feedback
• Eliminate unnecessary scanning

Phase 4

Based on the findings and
recommendations presented to
you in our report, your network
can be secured from the inside.
This will help to protect against
malicious insiders, intruders
who may gain physical access to
network resources, or external
hackers who successfully breach
perimeter defenses.

Results from Phase 3 will:
• Ensure “false positives” are
• Take care of “false negatives”
• Analyze breaches of your network’s
perimeter defense and formulate
detailed mitigation steps

Document preview PenTestBrochure_Final.pdf - page 1/2

Document preview PenTestBrochure_Final.pdf - page 2/2

Related documents

pentestbrochure final
jar 16 20296a grizzly steppe 2016 1229
458087 idc tech spotlight new ddos defense final
resume aman bakshi
hp cyber risk report 2015 executive summary

Link to this page

Permanent link

Use the permanent link to the download page to share your document on Facebook, Twitter, LinkedIn, or directly with a contact by e-Mail, Messenger, Whatsapp, Line..

Short link

Use the short link to share your document on Twitter or by text message (SMS)


Copy the following HTML code to share your document on a Website or Blog

QR Code

QR Code link to PDF file PenTestBrochure_Final.pdf