Identify security vulnerabilities on your network.
The vulnerability analysis are network scans performed using appropriate tools and trained personnel, to identify possible failures and potential threats that could be exploited.
With these procedures it is possible to direct the efforts to address these vulnerabilities.
It is ideal to be realized quarterly and after any significant change in infrastructure. These procedures are required and / or recommended by the information security standards such as PCI-DSS.
The intrusion test simulates attempts to access the corporate network by unauthorized persons (invasion), on two levels: Internal and External. It is ideal to be realized quarterly and after any significant change in the corporate network. These procedures are required and / or recommended by the information security standards such as PCI-DSS.
Perform intrusion tests require expertise in operating systems, network protocols, programming languages, communication devices, various applications and best PenTest tools. For our auditors can perform intrusion tests will need access to the latest vulnerability information, published or not.