Perimeter Security Assessment & Penetration Testing (PSA)

External vulnerability assessment, manual validation and penetration testing of Internet facing networks, systems, sites and applications (aka the hacker’s perspective). Includes identification, manual validation and benign exploitation of vulnerabilities, along with actionable remediation recommendations for improved security. Provides assurance that Internet-facing networks and systems are protected from hackers/malware.

Highlights
  • Scanning to baseline vulnerabilities and security risks
  • Testing can be performed overtly or covertly (with or without informing IT and security personnel)
  • Best-of-breed open source and commercial vulnerability harvesting tools
    • A cross section is used to limit exposure to the limitations of any single tool, and reap the benefits the strengths each tool provides
  • Manual validation to eliminate false positives, confirm findings
  • Manual testing to find additional vulnerabilities not found by scanning tools
  • Penetration testing through custom-built and pre-existing exploits to test real severity
    • Centristic’s pen testing and manual testing techniques are continually updated through research and participation in hacker forums and conferences (e.g. BlackHat, DEFCON, SANS)
  • Classification of severity of findings
  • Remediation recommendations
  • Benchmark analysis of results vs. industry
  • Retesting (within 6 months of initial)
Targets

Internet-facing networks, systems, applications, services, ports, protocols:

  • Web sites
  • Web applications (non-credentialed testing )
  • Servers
  • VPNs
  • Firewalls
  • Border routers
  • Internet-facing services (FTP, Telnet, SSH, and many more)
  • 100,000+ known vulnerabilities, client-specific vulnerabilities in custom applications, configurations and software

Need More Information?

How well is your company protected against a Malware or Ransomware attack? Contact us for a free Ransomware Simulation and validate your preparedness.

Contact Us