Penetration Test

Penetration Test

Internal Network Vulnerability Scanning

Attackers are the type of crawling that is applied to devices inside the corporate internal network to gain access to the internal network and prevent possible cyber attacks. The main devices in the network are the server, clients and other network elements. The site to be scanned can be visited by on-site visits or by remote access connections via VPN.

External Network Vulnerability Scanning

It is the process of scanning openings originating from systems such as operating systems, software, drivers and device configurations that are present in devices running on the server and clients of the corporate network. Control is provided so that unauthorized attempts to the network can not be made, these are reported. The tests performed here are carried out over the internet and will not cause the system to stop / interrupt.