847.221.0200  Main Office
800.925.0559  INCIDENT RESPONSE HOTLINE
Penetration Testing Image

Penetration Testing

How Do You Know If Your Systems Are Secure?

Penetration Testing (Pen testing) demonstrates what a malicious individual could accomplish and measures the effectiveness of existing security controls. Test findings include detailed recommendations that allow organizations to proactively implement countermeasures to prevent real world exploitation of identified vulnerabilities.

Penetration Tests can be performed from both external (remote) and internal (onsite) perspectives to assess common entry points into the environment. The following scope options are available:

  • Web Application Penetration Tests comprehensively evaluate critical web applications using multiple levels of access for web application security vulnerabilities.
  • External Network Penetration Tests assess the security of perimeter defenses of the hosts and services exposed to the internet. 
  • Internal Network Penetration Tests assess the security of internal private networks and hosts to assess what a malicious individual could compromise from within your environment.
  • Internal Wireless Penetration Tests assess the adequacy of wireless security controls designed to protect unauthorized access to corporate wireless services
  • Remote Social Engineering is a remote assessment performed under controlled conditions designed to validate the effectiveness of user security awareness and incident response processes, primarily through phishing attacks.
  • Onsite Social Engineering is performed to assess the effectiveness of physical security controls, employee response to suspicious behavior, and validate that network security controls cannot be bypassed by establishing an onsite presence.

 

HALOCK’s qualified team of pen testers has extensive experience in application development, network engineering, risk management, and compliance management. Our recommendations are qualified, accurate, and tailored to the needs of your organization.

We have a detailed and thorough planning and testing methodology to ensure all testing is conducted and closely coordinated to minimize the risk of disruption to your environment. And finally, our pen tests are comprehensive and include exhaustive exploit attempts, eliminating false positives and ensuring that results are accurate.


There are many reasons to conduct a Penetration Test:

  • Baseline external and internal pen testing to validate effectiveness of security controls
  • Recurring testing programs to minimize zero day threats
  • PCI DSS 11.3 and 6.6 specific testing to be compliant with the PCI DSS
  • Penetration tests to support Risk Assessments (including NIST 800-30 and ISO 27005)
  • Penetration testing as part of a deployment cycle for new infrastructure or applications
  • Penetration testing as part of due diligence for company acquisitions and third party agreements


If you would like to learn more about how pen testing can enhance your security posture, contact HALOCK today!