Defend 10

Risk Assessment

External Perimeter Penetration Test

An external penetration test researches and attempts to exploit vulnerabilities that could be performed by an external user without proper access and permissions.

Internal Network Penetration Test

An internal penetration test is similar to a vulnerability assessment, however, it takes a scan one step further by attempting to exploit the vulnerabilities and determine what information is actually exposed. 

Vulnerability Scan

A vulnerability scan is a process where we identify and create an inventory of all the systems connected to a network. For each device that is identified we also attempt to identify the operating system it runs and the software installed on it, along with other attributes such as open ports and user accounts. 

Firewall Configuration Audit

We check the visibility of actual network vulnerabilities including existing false-negatives. We significantly lower false-positives to investigate. We create risk prioritization with precise remediation with exact technical fixes. Our report is easy with actionable items.

Web Application Assessment

We first crawls the target application then we sends various inputs into the parameters of the pages and looks for specific web vulnerabilities such as SQL Injection, Cross-Site Scripting, Local File Inclusion, OS Command Injection, and many more. Furthermore, we also attempt to detect sensitive files from the server like backup files, old files, admin interfaces, archive files, etc.

Network Documentation

Network documentation management best practices start here. Find, track and know everything. Enjoy unmatched efficiencies, transparency and consistency throughout your organization with our network document management.