Port scanners determine existing devices, open ports and services operating on these ports—a beginning step for full penetration testing.
This is a highly automated scan based on a database that identifies operating systems, network hosts, services and applications and related vulnerabilities.
Also called pen testing, penetration testing involves network and vulnerability scanning combined with the human element of verification of vulnerabilities—a process that emulates a true hacking approach. External penetration testing simulates internet-based attacks, and internal testing simulates malicious acts by disgruntled individuals who have breached your network's perimeter defenses.
Once testing is complete, you'll receive a report documenting any concerns, along with recommendations on lessening the likelihood your organization will fall victim to system exploitation or information disclosure.
Network security is never complete. As new systems are implemented or changes are made to your existing system, the effect on security must be considered. Our dedicated penetration testing team members hold the latest certifications, including:
- Microsoft Certified Professional (MCP)
- Microsoft Certified Systems Engineer (MCSE)
- Microsoft Certified Professional + Internet (MCP+I)
- A+ Service Technician, Computing Technology Industry Association (CompTIA)