PDF Archive

Easily share your PDF documents with your contacts, on the Web and Social Networks.

Share a file Manage my documents Convert Recover PDF Search Help Contact



PenTestBrochure Final .pdf


Original filename: PenTestBrochure_Final.pdf

This PDF 1.4 document has been generated by Adobe InDesign CC 2017 (Macintosh) / Adobe PDF Library 15.0, and has been sent on pdf-archive.com on 18/01/2017 at 20:14, from IP address 50.255.x.x. The current document download page has been viewed 193 times.
File size: 449 KB (2 pages).
Privacy: public file




Download original PDF file









Document preview


Would you rather have a
trusted party or an attacker
break into your network?

We Listen. We Support. We Deliver.

We perform a penetration
test in the same way a
malicious attacker will exploit
your network.
For chain of vulnerabilities,
we do our homework and
present a best practice set of
solutions.
Sometimes a simple patch
download will suffice, but
more often than not, the
solutions is more complex.

www.velocitytechsolutions.com

2273 County Rd. C West
Roseville, MN 55113
651.633.0095
888.784.2088

External
Network
Penetration
&
Vulnerability
Assessment

Phase 1

Discovery

Our report provides your
network administrators with
detailed recommendations for
how to address specific findings.

To begin this assessement, our
Security Analysts will:
• Gather and analyze information
about the customer
• Thoroughly test and identify all
Internet entry points
• Prepare system target lists for the
Enumeration Phase

Phase 2

Enumeration
System targets identified in the
Discovery Phase are analyzed to
determine:
• Type of host (i.e. router, firewall,
web server, etc.)
• Operating system in use (including
version and patch level)

Phase 3

Automated
Scanning
Automated scanning tools are used
to determine potential vulnerabilities
available to be exploited. Information
gathered in the first two phases will:
• “Tune” the scanner
• Focus its effort
• Improve its feedback
• Eliminate unnecessary scanning

Phase 4

Based on the findings and
recommendations presented to
you in our report, your network
can be secured from the inside.
This will help to protect against
malicious insiders, intruders
who may gain physical access to
network resources, or external
hackers who successfully breach
perimeter defenses.

Intrusion
Analysis
Results from Phase 3 will:
• Ensure “false positives” are
eliminated
• Take care of “false negatives”
• Analyze breaches of your network’s
perimeter defense and formulate
detailed mitigation steps


PenTestBrochure_Final.pdf - page 1/2
PenTestBrochure_Final.pdf - page 2/2

Related documents


PDF Document pentestbrochure final
PDF Document building automation system market
PDF Document business management consultants your1634
PDF Document business management consultants your1771
PDF Document a few facts about penetration testing services
PDF Document devry cis 321 week 1 milestone 1


Related keywords