Penetration Testing

A penetration test, also known as a pentest or pen test, is a simulated cyber attack against your network devices.

Penetration Testing

What is Penetration Testing?

A penetration test, also known as a pentest or pen test, is a simulated cyberattack against your network devices (i.e. Computers, servers (Data-centers), firewalls and other appliances) to check for exploitable vulnerabilities. In the context of web application security, penetration testing is commonly used to augment a web application firewall (WAF)

Vulnerability Assessment

External Assessment

Identifies vulnerabilities from the outside in

Internal Assessment

Identifies vulnerabilities on the inside of the network

Social Engineering

Identifies vulnerabilities within guman resourcess & training gaps.

Application & Database

Identifies Software Vulnerabilities

Physical Security Assessment

Identifies vulnerabilities related to people & facilities

Wireless Assessment

Identifies vulnerabilities within wireless network

TeckPath understands the process of creating and maintaining a successful and efficient network infrastructure begins with a thorough assessment. Our network assessment will provide a wealth of information about your network environment and highlight challenges in areas that are typically neglected. Whether the client has major concerns with the current IT operational structure or not, this security vulnerability assessment is to have a better understanding of their data security and operational effectiveness.

Clients engage TeckPath to perform a comprehensive security and vulnerability assessment of their internal and external networks. This security audit and assessment will provide the most up-to-date and cost-effective method of gaining an external and internal view of their network.

TeckPath IT Security team will scan all 65,535 ports of IPs for potential security flaws, examine systems with over 27,000 vulnerability tests for security weakness, including Windows-based attacks, denial of service attacks, root exploits, CGI abuses, mail server vulnerabilities, Patch systems checks, virus definition checks and firewall vulnerabilities.

In addition to the Network Infrastructure Scan, we will also perform a standard Network Security Scan. This assessment aims to highlight common problems that are typically overlooked by technical staff. It also offers great reports that can be used to get a true understanding of your network security practices as compared to your policy.