PenTestBrochure Final .pdf
Original filename: PenTestBrochure_Final.pdf
This PDF 1.4 document has been generated by Adobe InDesign CC 2017 (Macintosh) / Adobe PDF Library 15.0, and has been sent on pdf-archive.com on 18/01/2017 at 19:14, from IP address 50.255.x.x.
The current document download page has been viewed 276 times.
File size: 449 KB (2 pages).
Privacy: public file
Download original PDF file
PenTestBrochure_Final.pdf (PDF, 449 KB)
Share on social networks
Link to this file download page
Would you rather have a
trusted party or an attacker
break into your network?
We Listen. We Support. We Deliver.
We perform a penetration
test in the same way a
malicious attacker will exploit
For chain of vulnerabilities,
we do our homework and
present a best practice set of
Sometimes a simple patch
download will suffice, but
more often than not, the
solutions is more complex.
2273 County Rd. C West
Roseville, MN 55113
Our report provides your
network administrators with
detailed recommendations for
how to address specific findings.
To begin this assessement, our
Security Analysts will:
• Gather and analyze information
about the customer
• Thoroughly test and identify all
Internet entry points
• Prepare system target lists for the
System targets identified in the
Discovery Phase are analyzed to
• Type of host (i.e. router, firewall,
web server, etc.)
• Operating system in use (including
version and patch level)
Automated scanning tools are used
to determine potential vulnerabilities
available to be exploited. Information
gathered in the first two phases will:
• “Tune” the scanner
• Focus its effort
• Improve its feedback
• Eliminate unnecessary scanning
Based on the findings and
recommendations presented to
you in our report, your network
can be secured from the inside.
This will help to protect against
malicious insiders, intruders
who may gain physical access to
network resources, or external
hackers who successfully breach
Results from Phase 3 will:
• Ensure “false positives” are
• Take care of “false negatives”
• Analyze breaches of your network’s
perimeter defense and formulate
detailed mitigation steps
Link to this page
Use the permanent link to the download page to share your document on Facebook, Twitter, LinkedIn, or directly with a contact by e-Mail, Messenger, Whatsapp, Line..
Use the short link to share your document on Twitter or by text message (SMS)
Copy the following HTML code to share your document on a Website or Blog