PenTestBrochure Final .pdf

File information


Original filename: PenTestBrochure_Final.pdf

This PDF 1.4 document has been generated by Adobe InDesign CC 2017 (Macintosh) / Adobe PDF Library 15.0, and has been sent on pdf-archive.com on 18/01/2017 at 19:14, from IP address 50.255.x.x. The current document download page has been viewed 276 times.
File size: 449 KB (2 pages).
Privacy: public file


Download original PDF file


PenTestBrochure_Final.pdf (PDF, 449 KB)


Share on social networks



Link to this file download page



Document preview


Would you rather have a
trusted party or an attacker
break into your network?

We Listen. We Support. We Deliver.

We perform a penetration
test in the same way a
malicious attacker will exploit
your network.
For chain of vulnerabilities,
we do our homework and
present a best practice set of
solutions.
Sometimes a simple patch
download will suffice, but
more often than not, the
solutions is more complex.

www.velocitytechsolutions.com

2273 County Rd. C West
Roseville, MN 55113
651.633.0095
888.784.2088

External
Network
Penetration
&
Vulnerability
Assessment

Phase 1

Discovery

Our report provides your
network administrators with
detailed recommendations for
how to address specific findings.

To begin this assessement, our
Security Analysts will:
• Gather and analyze information
about the customer
• Thoroughly test and identify all
Internet entry points
• Prepare system target lists for the
Enumeration Phase

Phase 2

Enumeration
System targets identified in the
Discovery Phase are analyzed to
determine:
• Type of host (i.e. router, firewall,
web server, etc.)
• Operating system in use (including
version and patch level)

Phase 3

Automated
Scanning
Automated scanning tools are used
to determine potential vulnerabilities
available to be exploited. Information
gathered in the first two phases will:
• “Tune” the scanner
• Focus its effort
• Improve its feedback
• Eliminate unnecessary scanning

Phase 4

Based on the findings and
recommendations presented to
you in our report, your network
can be secured from the inside.
This will help to protect against
malicious insiders, intruders
who may gain physical access to
network resources, or external
hackers who successfully breach
perimeter defenses.

Intrusion
Analysis
Results from Phase 3 will:
• Ensure “false positives” are
eliminated
• Take care of “false negatives”
• Analyze breaches of your network’s
perimeter defense and formulate
detailed mitigation steps


Document preview PenTestBrochure_Final.pdf - page 1/2

Document preview PenTestBrochure_Final.pdf - page 2/2

Related documents


pentestbrochure final
jar 16 20296a grizzly steppe 2016 1229
458087 idc tech spotlight new ddos defense final
cybersecurity
resume aman bakshi
hp cyber risk report 2015 executive summary

Link to this page


Permanent link

Use the permanent link to the download page to share your document on Facebook, Twitter, LinkedIn, or directly with a contact by e-Mail, Messenger, Whatsapp, Line..

Short link

Use the short link to share your document on Twitter or by text message (SMS)

HTML Code

Copy the following HTML code to share your document on a Website or Blog

QR Code

QR Code link to PDF file PenTestBrochure_Final.pdf