Recent high profile hacks have shown that hackers exploit common vulnerabilities using well understood and documented techniques. Every organisation is a target, even those without high value information assets. Compromised systems are a valuable commodity. They are often used to amplify DDoS attacks, act as a jump point for hacking other businesses and to send spam or host illegal content. Cybercriminals will scour the internet for vulnerable systems and organisations with weak IT security. It is important to identify your weaknesses before cybercriminals do.
As part of our comprehensive portfolio of Security Assessment Services, a Spot Check Penetration Test attempts to identify and compromise vulnerable systems. Working under strict ethical guidelines IPOptions ethical hackers simulate an attack from the perspective of a hacker. use all the skills and resources at their disposal to compromise the system or application under review. We start by conducting a vulnerability scan against the target using a combination of commercial and proprietary tools. The results of the scans are reviewed and vetted by an expert analyst and any false positives are removed. Where possible, vulnerabilities are exploited to prove their validity. We’ll then provide a detailed report outlining all the vulnerabilities discovered, prioritised by risk, as well as the recommended remediation steps. Our detailed findings provides the information you need to prevent a real hacker compromising your business.
Reduce risk of attack
Mimicking real hacker behaviours provides a higher level of assurance.
Exhaustive, multi-layered vulnerability assessment using a combination of tools and techniques.
Discover all your vulnerabilities
Exploring all potential vulnerabilities and attack methods increases the likelihood of finding potential security issues.
Prioritise your risks
False positives are eliminated by expert analysts, with reporting focused on the issues that matter the most to your organisation.
Our ethical hackers simulate cybercriminals, identifying security issues beyond the capability of automated tools
Test performed by ethical hackers IPOptions security analysts apply 17 years of ethical hacking experience to deliver a detailed security assessment of your external environment or web application
Comprehensive scanning tools We apply a combination of seven best-of-breed scanning tools, IPOptions custom-developed tools and expert human verification
Vulnerability verification Assessment results are verified against known vulnerability databases and attack methods to ensure all possible security issues are explored
Detailed analyst reporting Our ethical hackers review all false positives to present: - Executive summary of findings with recommendations, risk summary and network health assessment - Detailed information on vulnerabilities prioritised by ease of exploit and potential impact