Portfolio Category: Services

Web Application Testing

Web Application Penetration Testing, sometimes referred to as WebApp PenTesting, is the act of simulating an attack on or through a web site or internet application.  WebApp's are everywhere today and more and more attacks begin with a vulnerability in an internet facing website. Today's market is driving companies to produce web content at an alarming pace....
Read more

Vulnerability Assessment

We strongly suggest companies who have never had a vulnerability assessment start here.  Vulnerability Assessments are lower cost and provide much more benefit to fledgling security programs compared to penetration tests.   Contact us or specific details; basic offerrings are described below. Vulnerability assessment, also known as vulnerability analysis, is a process that defines, identifies, and classifies the security...
Read more

Penetration Testing

If you've never had a Vulnerability Assessment performed, please go to that section first.penetration test, sometimes referred to as a pentest, is a method of evaluating the security of a computer system or network by simulating an attack from malicious outsiders (who do not have an authorized means of accessing the organization's systems), and malicious...
Read more

Phishing Campaigns

Phishing is one of the biggest threats in I.T. security today.  The best application aware firewalls, WAFS, IPS, XML Gateways, and log management are no match if an attacker can get a single user in your environment to click a link.  This is how the majority of advanced persistent threat type attacks occur.  Not because it's...
Read more