Network Pen

Pen Testing

InfoSight will help answer these questions and any others you may have by identifying exactly where your systems are vulnerable and by testing the impact and risk associated with these vulnerabilities.

  • How difficult is it for a hacker to penetrate my network from the outside?
  • What measures and methods should we implement to best protect our assets?
  • Exactly what information is at risk?

Our network penetration testing activities will reveal how well and how effectively your organization's security policies actually protect your assets. We will identify the extent to which your system can be compromised before your organization becomes victim to an actual attack. InfoSight's penetration testing includes:

  • Gathering information about the target before the test (reconnaissance)
  • Identifying possible entry points and vulnerabilities
  • Attempting to actually break in (either virtually or for real)
  • Reporting back the findings and results
Performing a regular network pen is important because without one it’s impossible to tell what vulnerabilities your network has unless there has been an attack. If you add a new server to your network or change service providers there are potentially new vulnerabilities, performing a network pen would be an excellent way to re-discover your network after alterations have been made. Adding to your network without properly addressing the gaps in security could potentially threaten the entire network; a cyber-criminal could crash the entire network from one compromised server so it’s important to perform that network pen before it’s too late.

InfoSight can help address any questions you have about a network pen; with 15 years of experience providing compliance assurance and IT security InfoSight is an expert in discovery options and one of the best ways to provide customers with a list of vulnerabilities while providing possible solutions would be to perform a network pen.

If you have more questions about a network pen, contact us at

Complementary Services
Vulnerability Assessment
IT Risk Assessment
Social Engineering Testing and Training