847.221.0200  Main Office
800.925.0559  INCIDENT RESPONSE HOTLINE
Penetration Testing Image

Penetration Testing

How Do You Know If Your Systems Are Secure?

Penetration Testing (Pen testing) demonstrates what a malicious individual could accomplish in your environment and measures the effectiveness of existing security controls. Test findings include detailed recommendations that allow organizations to proactively implement countermeasures to prevent real world exploitation of identified vulnerabilities.


Penetration Tests are performed from a variety of perspectives to assess common entry points into the environment, including:

  • External Penetration Tests validate the security of perimeter defenses and services exposed to the internet. 
  • Internal Penetration Tests assess the security of private networks, hosts, and wireless infrastructure to assess what a malicious individual could compromise from within your environment.
  • Web Application Security Reviews evaluate critical web applications at the surface as well as behind authenticated components for web application security vulnerabilities.
  • Social Engineering is performed remotely or onsite to validate the effectiveness of employee security awareness training, incident response process, physical security controls, and related security measures.

 

HALOCK’s qualified team of pen testers has extensive experience in application development, network engineering, risk management, and compliance management. Our recommendations are qualified, accurate, and tailored to the needs of your organization.
 
We have a detailed and thorough planning and testing methodology to ensure all testing is conducted and closely coordinated to minimize the risk of disruption to your environment. And finally, our pen tests are comprehensive and include exhaustive exploit attempts, eliminating false positives and ensuring that results are accurate.

There are many reasons to conduct a Penetration Test:

  • Baseline external and internal pen testing to validate effectiveness of security controls
  • Recurring testing programs to minimize zero day threats
  • PCI DSS 11.3 and 6.6 specific testing to be compliant with the PCI DSS
  • Penetration tests to support Risk Assessments (including NIST 800-30 and ISO 27005)
  • Penetration testing as part of a deployment cycle for new infrastructure or applications
  • Penetration testing as part of due diligence for company acquisitions and third party agreements


If you would like to learn more about how pen testing can enhance your security posture, contact HALOCK today!