Not all companies need a penetration test to assess their security posture; regular vulnerability scans can serve as an effective alternative. Engineers conduct vulnerability scans to identify known vulnerabilities in systems without attempting exploitation, ultimately providing a prioritized remediation report based on risk.
firewalls/routers/switches (Juniper, Check Point, Cisco, Palo Alto), printers, storage
VMware ESX, ESXi, vSphere, vCenter, Microsoft, Hyper-V, Citrix Xen Server
Windows, OS X, Linux, Solaris, FreeBSD, Cisco iOS, IBM iSeries
Oracle, SQL Server, MySQL, DB2, Informix/DRDA, PostgreSQL, MongoDB
Web servers, web services, OWASP vulnerabilities
Configuration scanning of cloud applications and cloud instances e.g. AWS and Rackspace
The following are techniques that can be performed during the assessment, depending on your environment and needs:
All findings will be documented in a final report, which will be evaluated against a strengths and weaknesses profile aligned with international IT and Cyber Security standards. Identified weaknesses will be assessed and accompanied by prioritized recommendations and remediation actions based on associated risks.
The final report will be presented to you, featuring a comprehensive C-level summary of the security audit or penetration test conducted. Additionally, it will include detailed results, supporting evidence, and recommendations for future security enhancements.
Explanation Call with Dev/Fixing Team if required
Complementary Re-Test within four months of Initial Report Submission
Penetration testing simulates real-world attacks to identify and exploit vulnerabilities, providing a detailed assessment of security weaknesses and their potential impact. In contrast, vulnerability scanning automates the identification of known vulnerabilities without actively exploiting them, resulting in a broader but less detailed overview.
Ultimately, penetration testing delivers deeper insights and actionable recommendations, making it a more effective approach for enhancing security posture.
It depends on the scale of the scope. That’s said, most of the penetration tests we perform fall within the range of HKD$20,000-$60,000. Reach out for your quote today!
We have to confirm the scope, your expectations and concerns before kickstarting the assessment. Once everything is solved, we can start immediately upon approval of our proposal.
Yes, our testing protocols surpass the guidelines recommended by the PCI Standards Council and ISO/IEC.
Arguably nothing can guarantee 100% security. However, vulnerability scanning identifies outdated systems or services, which are always considered low-hanging fruits that welcome hackers in the wild.
We uncover the unknown unknowns in your cyber assets! This is typically in the form of a detailed report that contains discovered vulnerabilities, their potential risks, and remediation recommendations.
We also include a comprehensive C-level summary so that you may present the results to your boss much more readily 🙂
Simply fill out and submit the form, and we’ll provide you with a quote shortly
West Wing, 2/F, 822 Lai Chi Kok Road, Cheung Sha Wan, Kowloon