Is your business prepared to handle the most common types of network vulnerabilities? Find out here...| PurpleSec
There are 8 steps to conducting a security risk assessment including mapping your assets, identifying security threats and vulnerabilities, determining and prioritizing risks, analyzing and developing security controls, documenting results, creating a remediation plan, implementing recommendations, and evaluating effectiveness.| PurpleSec
We use MITRE's ATT&CK framework to test resilience against the latest attacks and APT techniques. Projects starting at $8,000.| PurpleSec
The different types of penetration tests include network services, web application, client side, wireless, social engineering, and physical.| PurpleSec
Social engineering penetration testing focuses on people and processes and the vulnerabilities associated with them.| PurpleSec
Physical penetration testing exposes weaknesses in physical security controls with the goal of strengthening a business's security posture.| PurpleSec
Wireless penetration testing is comprised of six main steps including reconnaissance, identifying wireless networks, vulnerability research, exploitation, reporting, and remediation.| PurpleSec
Performing a successful network penetration test includes information gathering and understanding client expectations, reconnaissance and discovery, performing the penetration test, and reporting on recommendations and remediation.| PurpleSec
There are 13 steps to firewall penetration testing, which include locating the firewall, conducting tracerroute, scanning ports, banner grabbing...| PurpleSec
Web application penetration tests are performed primarily to maintain secure software code development throughout its lifecycle.| PurpleSec