Network Pen Test

Pen Testing

In today's ever-advancing society, the need for conducting a Network Pen Test is becoming more and more critical. InfoSight will help answer the questions listed above and any others you may have, and we will identify exactly where your systems are vulnerable and test the impact and risk associated with these vulnerabilities.

  • How easy is it for a hacker to penetrate my network from the outside?
  • What measures and methods should we implement to best protect our assets?
  • Exactly what information is at risk of being breached?
 

Our Network Pen Test will identify how well and how effectively your organization's current security policies are actually protecting your assets. We will identify the extent to which your systems can be compromised before your organization becomes victim to an actual attack. InfoSight's penetration testing includes the following:

  • Gathering information about the target before the test (reconnaissance)
  • Identifying possible entry points and vulnerabilities
  • Attempting to actually break in (either virtually or for real)
  • Reporting back the findings and results
How difficult would it be for a hacker to penetrate my network from the outside? What measures should we implement to protect our assets? What information is at risk? Performing a network pen test will answer all of these questions for you and this article will explain why.

External and Internal – Secure from top to bottom
An External network pen test will provide a keen outlook on how a hacker would attempt an attack on the network facing the internet. This will test the perimeter firewalls and the Intrusion detection system in place as well as web application firewalls. An external network pen test will also assess the level of security that applications facing the internet have and how to mitigate the risk associated with these applications. An Internal network pen test will test the security measures put inside the perimeter firewall. It will measure the amount of information an employee or a hacker who has stolen employee credentials is able to attain. The ethical hacker will also attempt to access privileged information without user credentials to assess whether a hacker can attain this information by creating an administrator or a super user. This will determine if a user with physical access to the environment can attain privileged information.

A Trusted Advisor
InfoSight is a premier provider of compliance assurance and IT security solutions dedicated to the prevention of cyber-crime and education of security for the sole reason of being and remaining financially secure. InfoSight can provide a quality network pen test that will include detailed reports of vulnerabilities, entry vectors, and possible solutions. InfoSight can also provide assistance with the mitigation after the test is completed.

If you would like more information about our network pen test, contact us at info @ InfoSightInc.com

Complementary Services
Vulnerability Assessment
IT Risk Assessment
Social Engineering Testing and Training