Get to know your goals, concerns, “company crown jewels” that needs to be protected, and the desirable schedule.
Then we will formalize the scope and provide a quote.
We agree on the schedule, and the prerequisites for the test.
We start the security test and update your contact point with the testing findings as we go.
We start reconnaissance and gather information about the assets in scope. We use automated tools to support our testing but we focus on the latest manual hacking techniques and methodologies with and eye on compliance requirements.
We create the testing report to present the detailed findings description, severity and recommendations on how to fix them.
The report contains executive summary with an explanation of the overall risk.
The partnership does not end with the report, we support you with fixing the findings and a retest to help your team close any security gaps.