{"id":298,"date":"2022-05-16T16:34:28","date_gmt":"2022-05-16T16:34:28","guid":{"rendered":"https:\/\/thesecurityone.com\/?page_id=298"},"modified":"2022-09-07T07:43:17","modified_gmt":"2022-09-07T07:43:17","slug":"cybersecurity-services","status":"publish","type":"page","link":"https:\/\/thesecurityone.com\/index.php\/cybersecurity-services\/","title":{"rendered":"Cybersecurity Services"},"content":{"rendered":"<div  data-label=\"Content\" data-id=\"content--2\" data-export-id=\"content-16\" data-category=\"content\" class=\"content-16 content-section content-section-spacing content-relative\" id=\"content-2\" style=\"background-color: rgb(255, 255, 255);\"><div  class=\"gridContainer\"><div  data-section-title-area=\"true\" class=\"row text-center\">   <div  class=\"section-title-col\" data-type=\"column\">       <h2  class=\"\" style=\"text-align: center;\"><span  style=\"color: rgb(3, 169, 244); font-weight: 700;\">Penetration Testing<\/span><\/h2>       <p  class=\"lead\" style=\"text-align: justify;\">Our penetration testers will perform various tests to validate the effectiveness of controls and also to determine the integrity or configuration of an application, a system or network.&nbsp;They are experienced in performing testing within critical operational environments, regulated industries and on a wide range of devices and systems.<br >\nBased on the findings of our assessment and testing, we will make recommendations for specific mitigations to reduce risks and prevent incidents in an organisation\u2019s business and operational environment.<\/p>   <\/div><\/div> <div  class=\"row middle-sm\"><div  class=\"col-sm-6 space-bottom-xs\" data-type=\"column\">  <h3  class=\"\" style=\"text-align: left;\"><span  style=\"color: rgb(3, 169, 244); font-weight: 600;\">Types of Penetration Testing<\/span><\/h3> <p  class=\"lead\"><span  style=\"font-weight: 600;\">External Penetration Testing<\/span><\/p><p  class=\"lead\"><span  style=\"font-weight: 600;\">Internal Penetration Testing<\/span><\/p><p  class=\"lead\"><span  style=\"font-weight: 600;\">Application Penetration Testing<\/span><\/p><p  class=\"lead\"><span  style=\"font-weight: 600;\">Physical Penetration Testing<\/span><\/p><p  class=\"lead\"><span  style=\"font-weight: 600;\">Wireless Penetration Testing<\/span><\/p><p  class=\"lead\" style=\"text-align: left;\"><span  style=\"font-weight: 600;\">Social Engineering<\/span><\/p><\/div> <div  class=\"col-sm-6 flexbox around-xs top-xs space-top-xs space-bottom-xs\"><div  class=\"overlay-box flexbox middle-xs center-xs overlay-holder\"> <div  class=\"overlay-box-offset shadow-medium border-color2 hide-xs offset-border\"><\/div> <img decoding=\"async\"  class=\"flexbox shadow-large img1\" data-size=\"500x500\" src=\"https:\/\/thesecurityone.com\/wp-content\/uploads\/2022\/05\/1-1.jpeg\" title=\"1-1\" alt=\"\"><\/div> <\/div><\/div> <\/div><\/div><div  data-label=\"Features\" data-id=\"features--2\" data-export-id=\"features-6\" data-category=\"features\" class=\"features-6 content-section-spacing\" id=\"features-2\" style=\"background-color: rgb(245, 250, 253); background-image: none;\"><div  class=\"gridContainer\"> <div  class=\"row text-center\"><div  class=\"section-title-col\" data-type=\"column\"> <h2  class=\"\">Our Approach<\/h2> <\/div> <\/div> <div  data-type=\"row\" class=\"row space-bottom content-center-sm center-sm\"> <div  class=\"col-xs-12 col-sm-4 col-padding-small-xs col-md-3 \"> <div  class=\"row\"> <div  class=\"col-xs-fit\"> <p  class=\"oval color2\"><span  style=\"color: rgb(3, 130, 244); font-weight: 600;\">1<\/span><\/p><\/div> <div  class=\"col-xs left-text\" data-type=\"column\"><h4  class=\"color2\"><span  style=\"color: rgb(3, 130, 244); font-weight: 600;\">PRE-ENGAGEMENT INTERACTIONS<\/span><span  id=\"_mce_caret\" data-mce-bogus=\"1\" data-mce-type=\"format-caret\"><span  style=\"color: rgb(3, 130, 244); font-weight: 600;\">\ufeff<\/span><\/span><\/h4> <p  class=\"\">Represents the phase in which we discuss with the client about the rules of engagement for penetration testing<\/p><\/div> <\/div><\/div> <div  class=\"col-xs-12 col-sm-4 col-padding-small-xs col-md-3 \"><div  class=\"row\"> <div  class=\"col-xs-fit\"><p  class=\"oval color2\"><span  style=\"color: rgb(3, 130, 244); font-weight: 600;\">2<\/span><\/p><\/div> <div  class=\"col-xs left-text\" data-type=\"column\"><h4  class=\"color2\"><span  style=\"color: rgb(3, 130, 244); font-weight: 600;\">INTELLIGENCE GATHERING<\/span><span  id=\"_mce_caret\" data-mce-bogus=\"1\" data-mce-type=\"format-caret\"><span  style=\"color: rgb(3, 130, 244);\">\ufeff<\/span><\/span><\/h4> <p  class=\"\">Represents the phase in which data is collected to help guide evaluation actions<\/p><\/div> <\/div><\/div> <div  class=\"col-xs-12 col-sm-4 col-padding-small-xs col-md-3 \"><div  class=\"row\"> <div  class=\"col-xs-fit\"><p  class=\"oval color2\"><span  style=\"color: rgb(3, 130, 244); font-weight: 600;\">3<\/span><\/p><\/div> <div  class=\"col-xs left-text\" data-type=\"column\"><h4  class=\"color2\"><span  style=\"color: rgb(3, 130, 244); font-weight: 600;\">SCANNING<\/span><\/h4> <p  class=\"\">It is the phase in which our testers will use automatic and manual tools to find vulnerabilities<\/p><\/div> <\/div><\/div> <div  class=\"col-xs-12 col-sm-4 col-padding-small-xs col-md-3\"> <div  class=\"row\"> <div  class=\"col-xs-fit\"> <p  class=\"oval color2\"><span  style=\"color: rgb(3, 130, 244); font-weight: 600;\">4<\/span><\/p><\/div> <div  class=\"col-xs left-text\" data-type=\"column\"><h4  class=\"color2\"><span  style=\"color: rgb(3, 130, 244); font-weight: 600;\">VULNERABILITY ANALYSIS<\/span><\/h4> <p  class=\"\">It represents the phase in which we identify and evaluate the security risks presented by the identified vulnerabilities<\/p><\/div> <\/div><\/div><div  class=\"col-xs-12 col-sm-4 col-padding-small-xs col-md-3\"> <div  class=\"row\"> <div  class=\"col-xs-fit\"> <p  class=\"oval color2\"><span  style=\"color: rgb(3, 130, 244); font-weight: 600;\">5<\/span><\/p><\/div> <div  class=\"col-xs left-text\" data-type=\"column\"><h4  class=\"color2\"><span  style=\"color: rgb(3, 130, 244); font-weight: 600;\">EXPLOITATION<\/span><\/h4> <p  class=\"\">It is the phase in which our testers will exploit the vulnerabilities found<\/p><\/div> <\/div><\/div><div  class=\"col-xs-12 col-sm-4 col-padding-small-xs col-md-3\"> <div  class=\"row\"> <div  class=\"col-xs-fit\"> <p  class=\"oval color2\"><span  style=\"color: rgb(3, 130, 244); font-weight: 600;\">6<\/span><\/p><\/div> <div  class=\"col-xs left-text\" data-type=\"column\"><h4  class=\"color2\"><span  style=\"color: rgb(3, 130, 244); font-weight: 600;\">REPORTING<\/span><\/h4> <p  class=\"\">It is the phase in which our testers prepare the penetration test report<\/p><\/div> <\/div><\/div><div  class=\"col-xs-12 col-sm-4 col-padding-small-xs col-md-3\"> <div  class=\"row\"> <div  class=\"col-xs-fit\"> <p  class=\"oval color2\"><span  style=\"color: rgb(3, 130, 244); font-weight: 600;\">7<\/span><\/p><\/div> <div  class=\"col-xs left-text\" data-type=\"column\"><h4  class=\"color2\"><span  style=\"color: rgb(3, 130, 244); font-weight: 600;\">RETESTING<\/span><\/h4> <p  class=\"\">It is the phase in which our testers validate that the identified vulnerabilities have been successfully fixed<\/p><\/div> <\/div><\/div><\/div> <div  class=\"row\"> <div  data-type=\"column\" class=\"col-xs-12 text-center\"> <\/div> <\/div><\/div> <\/div><div  data-label=\"Cta\" data-id=\"cta--1\" data-export-id=\"cta-centered-bg-section\" data-category=\"cta\" data-section-ov=\"1\" class=\"cta-centered-bg-section content-section content-section-spacing-medium white-text\" data-parallax-depth=\"20\" id=\"cta-1\" style=\"background-color: rgb(245, 250, 253);\"><div  class=\"gridContainer\"> <div  class=\"row text-center\"><div  data-type=\"column\" class=\"\"> <h2  class=\"\">Join us! <span  class=\"font-300\">It will only take a minute<\/span><\/h2> <a class=\"button color1\" href=\"https:\/\/thesecurityone.com\/index.php\/contact-us\" target=\"_self\" data-cp-link=\"1\" data-icon=\"\" rel=\"noopener\">GET STARTED TODAY<\/a><\/div> <\/div><\/div> <\/div><div  data-label=\"Content\" data-id=\"content--3\" data-export-id=\"content-6-2\" data-category=\"content\" class=\"content-6-2 content-section content-section-spacing\" id=\"content-3\" style=\"background-color: rgb(255, 255, 255); background-image: none;\"><div  class=\"gridContainer\"> <div  class=\"row text-center\"><div  class=\"section-title-col\" data-type=\"column\"> <h2  class=\"\"><span  style=\"font-weight: 600;\">Penetration Test Report<\/span><\/h2> <\/div> <\/div> <div  class=\"row middle-sm\"> <div  class=\"col-sm-6 flexbox around-xs top-xs\"> <div  class=\"overlay-box flexbox middle-xs center-xs overlay-holder\"> <div  class=\"overlay-box-offset offset-border shadow-medium border-color2 hide-xs\"><\/div> <img decoding=\"async\"  class=\"flexbox shadow-large img1\" data-size=\"485x632\" src=\"https:\/\/thesecurityone.com\/wp-content\/uploads\/2022\/05\/PTR.jpg\" title=\"PTR\" alt=\"\"><\/div> <\/div> <div  class=\"col-sm-6 space-top-xs\"> <div  class=\"row\"> <div  class=\"col-xs-12 space-bottom\" data-type=\"column\">  <\/div> <div  data-type=\"row\" class=\"col-xs-12\"><div  class=\"row space-bottom force-align\"> <div  class=\"col-xs-12 col-sm-fit text-center\"><i  class=\"fa icon fa-check-square-o big color1\"><\/i><\/div> <div  class=\"col-xs-12 col-sm\" data-type=\"column\"><h5  class=\"color1\"><span  style=\"font-weight: 700;\">Executive Summary<\/span><\/h5> <p  class=\"\" style=\"text-align: justify;\">It provides a very brief overview of your major findings and their potential impact on the business being tested<\/p><\/div> <\/div> <div  class=\"row space-bottom force-align\"> <div  class=\"col-xs-12 col-sm-fit text-center\"> <i  class=\"fa icon fa-check-square-o big color1\"><\/i><\/div> <div  class=\"col-xs-12 col-sm\" data-type=\"column\"><h5  class=\"color1\"><span  style=\"font-weight: 700;\">Recommendations<\/span><\/h5> <p  class=\"\">Our recommendations for remedial approach<\/p><\/div> <\/div> <div  class=\"row space-bottom force-align\"> <div  class=\"col-xs-12 col-sm-fit text-center\"><i  class=\"fa icon fa-check-square-o big color1\"><\/i><\/div> <div  class=\"col-xs-12 col-sm\" data-type=\"column\"><h5  class=\"color1\"><span  style=\"font-weight: 700;\">Evaluation Methodology<\/span><\/h5> <p  class=\"\" style=\"text-align: justify;\">The evaluation methodology used for automatic and manual penetration testing<\/p><\/div> <\/div><div  class=\"row space-bottom force-align\"> <div  class=\"col-xs-12 col-sm-fit text-center\"><i  class=\"fa icon fa-check-square-o big color1\"><\/i><\/div> <div  class=\"col-xs-12 col-sm\" data-type=\"column\"><h5  class=\"color1\"><span  style=\"font-weight: 700;\">Findings Summary<\/span><\/h5> <p  class=\"\" style=\"text-align: justify;\">List of all vulnerabilities found and classified according to their risk and impact<\/p><\/div> <\/div><div  class=\"row space-bottom force-align\"> <div  class=\"col-xs-12 col-sm-fit text-center\"><i  class=\"fa icon fa-check-square-o big color1\"><\/i><\/div> <div  class=\"col-xs-12 col-sm\" data-type=\"column\"><h5  class=\"color1\"><span  style=\"font-weight: 700;\">Vulnerabilities Details<\/span><\/h5> <p  class=\"\" style=\"text-align: justify;\">For each vulnerability, we will include the associated risk, the technical description, the proof of concept, its impact and the recommended remedial actions<\/p><\/div> <\/div><\/div> <\/div><\/div> <\/div><\/div> <\/div>","protected":false},"excerpt":{"rendered":"<p>Penetration Testing Our penetration testers will perform various tests to validate the effectiveness of controls and also to determine the integrity or configuration of an application, a system or network.&nbsp;They are experienced in performing testing within critical operational environments, regulated industries and on a wide range of devices and systems. Based on the findings of&hellip; <br \/> <a class=\"read-more\" href=\"https:\/\/thesecurityone.com\/index.php\/cybersecurity-services\/\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"pro\/page-templates\/full-width-page.php","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-298","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/pages\/298","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/comments?post=298"}],"version-history":[{"count":0,"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/pages\/298\/revisions"}],"wp:attachment":[{"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/media?parent=298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}