Technical Aspects
Internal and external penetration testing
To test the robustness of network perimeter protection
To identify security vulnerabilities that could be exploited by an attacker
To obtain network security recommendations
Application penetration testing
To obtain an overall assessment of the security of your applications
To identify application security flaws (inherent in insecure development practices
To perform an application security acceptance test before going into produc
Configuration audit
For in-depth discovery of technical vulnerabilities (white-box testing)
To determine asset compliance with hardening standards and best security practices
Architecture audit
For in-depth discovery of technical vulnerabilities (white-box testing)
To determine asset compliance with hardening standards and best security practices