Penetration Test
TEST THE SECURITY OF YOUR INFRASTRUCTURE AND MAKE IT SAFE
Increase the security of your systems, business processes and measure the responsiveness of the personnel assigned to protect them with the IRIDEOS Penetration Test.
RECOGNIZE AND SCAN
Collection of all information relating to the vulnerability of systems and applications.
COMPROMISE
Attempts to compromise systems and applications by exploiting identified vulnerabilities.
VALIDATION AND REPORTING
Validation, review and presentation of the results obtained.
The Service components
-
PENETRATION TEST OF THE NETWORK
We verify and measure the possibility of penetration of the components of your company’s systems (operating systems, midlleware, databases).
-
APPLICATION PENETRATION TEST
We verify and measure the possibility of getting hold of your company data, trying to penetrate company applications.
The applications on which we perform the tests can be both on the Internet, and therefore reachable through a public IP address (e.g. website), and internal to the corporate network. -
SIMULATION OF A FULL ATTACK
All the experience and expertise of our technical staff concentrated in a single attack with multiple methods and techniques (including for example the use of phishing campaigns or the use of social engineering) to verify and measure the possibility of entering the internal network of your company.
The Goals

Determine the vulnerabilities that can compromise information systems.

Evaluate the impacts of an attack in terms of confidentiality, integrity and availability of data and services.

Evaluate the impacts and consequences of an attack on all company information systems.

Evaluate the effectiveness of corporate defense systems and the ability of personnel and processes to react to an attack.