Penetration Testing, also known as a pen test, is a simulated cyber attack against your computer systems to check for exploitable vulnerabilities.
A series of real-world attack simulations are performed against the systems. Penetration testing includes testing your security controls and assessing your infrastructure for vulnerabilities and weaknesses that may compromise and gain unauthorized access to your systems.
Requirements for Penetration Testing
The penetration test includes testing your security controls to identify and evaluate your network topology, active hosts, IP addresses, installed operating systems, open network ports, and all installed security devices.
The data obtained from the analysis stage of the test is used to exploit the determined weak points of your network to attempt to gain access. A system restore is immediately performed to return the network to its previous state prior to the intrusion.
After conducting the penetration test, the results are then documented in a detailed report on all areas of your enterprise to assess how and why the intrusions were successful. The penetration test report will provide all testing results, all intrusions, the areas of the system that were compromised during an intrusion, intrusion-resistance recommendations, and qualitative analysis information. Your IT team can then work to resolve the findings or have the Clarus Tech Partners team help you with the remediation.
Once all high and medium vulnerabilities are remediated, we will then rescan and provide a certified pass report to meet your audit, regulatory and compliance requirements.
Proactively assess your network for vulnerabilities and identify corrective actions
Web-based portal to conduct self-managed penetration testing
Scan your network to assess vulnerabilities for security and compliance requirements
Improve your overall security posture and your policies and procedures by understanding the vulnerabilities within your network and how to remediate them
Identify and exploit vulnerabilities by simulating real-world attacks to assess the security posture of your network
Detailed vulnerability report including high, medium, and low vulnerabilities found and exploited with remediation guidance
Meets penetration testing compliance requirements with validated and attested reports
Certified pass report after assessing that there are no high or medium vulnerabilities in your environment
Order Your Penetration Testing
External penetration tests target the assets of a company that are visible on the internet, for example, the web application itself, the company website, and email and domain name servers (DNS). The goal is to gain access and extract valuable data.
Internal penetration tests target access to applications and systems behind firewalls and simulates an attack by a malicious insider.
Web Application Penetration Tests look at both user interfaces and application programming interfaces (APIs) to focus on identifying any exploitable vulnerabilities in your applications.