CSIS
Pinpoint your cybersecurity <br/> weak points.

PENETRATION TEST

Pinpoint your cybersecurity
weak points.

GET THE BROCHURE

Context

Why should you conduct a Penetration Test?

 

 

  • Improve your security posture.
  • Determine whether your critical assets and data are actually at risk.
  • Avoid financial, operational and reputational losses caused by cyber attacks.
  • Identify cyber security weaknesses before an attacker exploits them
  • Get quantitative results that help measure the risk associated with your critical assets.
  • Gain insight into attacker motivations and most likely targets.

How it works

Discover how vulnerable your most critical assets are to cyber attacks.

 

 

CSIS supplies a laptop to the customer, who then connects the laptop to the organisation’s network. The laptop establishes a secure connection back to CSIS, either via the organisation’s network.


The laptop is used to observe, collect and analyse information flowing through the organisation’s network. The work is primarily manual, although some processes are automated.


The test will typically run for 2-4 weeks, although this figure varies according to the nature of the organisation and IT setup.


As results accumulate during this period, CSIS increases the amount of active testing and applies a range of simulated attacks. The actual man hours spent on this are typically much less than the total duration of the test.


The customer may set up 3 pre-defined targets for simulated attack (e.g. compromising the Active Directory, the organisation’s  ERP system, or even the CTO’s email).

Learn more

Improve your cyber security posture

Penetration tests may include, but are not limited to:

  • Exposing insufficient network protection
  • Use of weak user credentials
  • Exploitation of vulnerabilities in embedded devices
  • Try to gain domain admin credentials
  • Extraction of data

Learn more

"A CSIS penetration test will improve your security posture by identifying security weaknesses before a real attacker can exploit them."

REST ASSURED.

See us in action.

Request a Call

Rest Assured.

We are the leader in actionable and intelligence-driven detection and response services.

Please select a country