Computer security testing is extremely important step of assuring that your network and servers are secure. This test includes detailed analysis of security policies and is closest to the simulation of attempts of unauthorized activities on the client's network. There are two main scenarios of penetration testing, as you can see below. This testing will give you a realistic experience on your network security, no matter if you are simulating attack from the Internet or from your company's internal network. We recommend periodic repeating of penetration testing, as this is very effective method of keeping your security on a desired level.
Blind penetration testing
During this type of testing we are simulating real attack on the client's network. It will allow us to find all possible vulnerabilities on the client's network and servers without doing any damage.
Known penetration testing
Same test as previously, but in this case we have more information about client's network and servers. This test can be used as a simulation of company's employee attack.
Vulnerability scanning
This method will show security vulnerabilities on client's networks and servers. It is also recommended to repeat this test periodically, as it is very fast, non-destructive and will reveal high number (almost 99%) of commonly used security vulnerabilities. For detailed analysis we recommend one of the penetration testing services.