30 days guarantee

Penetration Testing: Advanced professional testing by accredited experts

Get in touch now

 

SSL FREE TRIAL

Experience the benefits of SSL encryption.
30 days FREE. No commitment.
TRY IT NOW

Another satisfied customer

SSL WIZARD

Your search for the right certificate just got easier.
Instant SSL recommendation.
TRY OUR FREE WIZARD
More info
Register your Domain Name
  • Bulk transfer domains
  • Register 400+ domain extensions
  • Free DNS management
  • Industry leading grace and redemption periods
  • No hidden fees

Can hackers easily gain access to your company's IT system?

Do you know what could happen if malicious hackers attempted to access your infrastructure, harvest passwords and data from your employees, or steal your customers’ details?

The results could be catastrophic. Security breaches and service interruptions are expensive for business - the average cost of a data breach for an affected company is now $3.5 million*.

Regardless of their size, location, status or industry sector, no company is immune to vulnerabilities.

Penetration Testing is an effective risk-management process which can identify the areas of vulnerability within your organisation's system so that you can eliminate the threats posed by hackers.

Request a free proposal

What is Penetration Testing?

A Penetration Test is a ethical means of hacking a computer system- it simulates a real-life attack on a computer system, network or organisation from either an internal or external perspective. Penetration testing allows you to test your entire infrastructure for security vulnerabilities so that you can be sure that your company's IT systems are secure from any internet based attack. There will be no damage to the infrastructure being tested; the aim is to highlight the risk associated with the company's computer systems.

An automatic vulnerability assessment does not use human interaction whereas Penetration Testing makes use of intelligent behaviour accompanied by real-life comments from the highly skilled CHECK certified testers.

Your system will be declared either: Critical, High, Medium or Low risk once testing has been completed and you will receive an in-depth report outlining the test's findings and steps for complete remediation.

Type of testing typically required

An external penetration test is designed to be an imitation of a real hack attack; the tester is "blind" and is not provided with any knowledge of your organisation's infrastructure beforehand.Each individual vulnerability can be targeted to test your company’s IT systems against any form of external internet based attack.

Our investigations for an external test could include any of the following:

  • External network testing
  • Remote access review
  • Website testing
  • Web Application testing
  • Mobile Application testing
  • Source Code review

Internal Penetration testing takes place from the perspective of an attack with inside knowledge of the IT infrastructure and both known and unknown vulnerabilities are targeted. The tester will be provided with varying levels of information concerning the internals of the systems being tested (user credentials, IP addresses, source codes, network protocols and diagrams..). This type of assessment will expose any potential issues that may allow a server to be compromised by a user already working within the internal network.

Our investigations for the above test could include any of the following:

  • Internal Infrastructure testing
  • Desktops
  • Laptop/workstation Review
  • Server Review
  • Wireless Vulnerability Assessment
  • VOIP
  • Mobile Device testing

Website Application Penetration Testing is a full test on the chosen website including testing for OWASP most common vulnerabilities. A web application test employs different software testing techniques to find "security bugs" in server/client applications of the organisation from the Internet.

Additionally, we also provide PCI DSS ASV Scanning, an external scan of your infrastructure related to card payments, and Social Engineering which includes Remote Social Engineering, Perimeter & Internal Security Review and a Physical Building Access review.

Our Penetration Tests can be occur in three different ways, and as this isn't a one-size-fits-all solution, we will always strive for the best approach based on your specific needs.

  • 'Black Box' testing - the tester is not provided with any previous information regarding the target system and this type of testing simulates a real-life hacking scenario.
  • 'White Box' testing - the tester receives information regarding the system in advance, and this allows for a precise and comprehensive testing of the entire infrastructure.
  • 'Grey Box' testing - a combination of Black and White testing. Partial information (IP addresses, low-level user credentials...) is provided to the tester in advance, in an attempt to increase their access levels to the system.

Contact one of our Web Security Consultants on sales@ssl247.com or 1-800-511-9176 to discuss the best solution for you as well as the other Penetration Testing services we provide.

Why should you perform Penetration Testing?

Our highly trained and experienced security and penetration testing specialists will investigate the strength of your infrastructure, networks, applications and policies. They will assess the resilience of your security controls, and identify any areas which could be exploited by a hacker.

Based on a signed agreement between the tester and organisation, our in-depth tests provide assurance that companies can operate at a level of security that is suitable for handling sensitive information.

Our special Partners

We work alongside special partners who hold CHECK status and are Tigerscheme certified. The highly skilled penetration testing specialists are either SC (Security Check) or DV (Developed Vetting) cleared, so you are guaranteed the highest level of quality, consistency and confidentiality.

Key Features

  • Ensure 'Security Best Practice' is in place in your business
  • Simple set up and implementation
  • Signed agreement between you and and your tester outlining the agreed scope they are authorised to test
  • On-going help and support - your dedicated Account Manager and Tester available to you through the entire testing process
  • Fast reporting time - receive your report within just 3 days
  • In-depth report including a Management Overview, Technical Overview and full post-testing remediation solutions - designed for each department in your organisation (IT, Management, Administration)

Why SSL247®?

SSL247® are accredited experts with over 12 years experience in the Web Security industry and a variety of accreditations including the EMEA Symantec Champion Award 2014 and the ISO 27001:2013 certification. We specialise in Online Business Continuity.

Get in touch with us today

For more information on how Penetration Testing can protect your business contact our friendly accredited consultants today for a no-obligation discussion:

   1-800-511-9176
  sales@ssl247.com



*2014 Cost of Data Breach Study: Global Analysis

Symantec

Norton seals are viewed more than half a billion times a day on more than 100,000 websites in 170 countries and in search results on enabled browsers, as well as partner shopping sites and product review pages. When website visitors see the Norton Trust Seal, they are less likely to abandon a transaction and more likely to do business with you online.

SSL Certificates

Our Partnerships
Our Accreditations
Our Trust Seal
Sitemap | Cookies | Legal
© 2016 . All rights reserved. SSL247 SARL is registered at Registre du Commerce in Roubaix-Tourcoing - RCS 508308 079. | Tel: 1-800-511-9176

Cookies SSL247 uses cookies to provide you a seamless user experience. For more information please read our Terms & conditions. Continue