We use cookies on this website to provide a user experience that’s more tailored to you. By continuing to use the website, you are giving your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.
I acceptAs cyber attacks increase significantly, organizations are more vulnerable to new threats posed by digitalization initiatives. Adopting comprehensive penetration testing to post an active and robust security posture to attackers is crucial.
Where Vulnerability Assessment is a more passive and analytical process, Penetration Testing is an active attempt to break through network defenses (ethical hacking), focusing attack attempts on the network, web applications and other organizational applications and entry points. Through penetration testing, enterprises can gain a better and comprehensive understanding of organizations’ security levels. Yet, the penetration testing is a damage-free exercise, only to test if security measures are sufficient against a simulated real-world attack.
TrustCSI™ PTS Penetration Test Service includes external and internal penetration testing exercises that simulate attacks on different occasions. Enterprises can then gain a comprehensive view of their security levels against different attack occasions.
To uncover what information (public or private) an attacker can gain from an organization via an attack originating externally, this External Penetration Testing Exercise will be conducted without any internal access “assistance” to simulate exploits against Internet-facing digital assets (e.g., web applications, web servers, network endpoints, VPN, e-mail servers). The majority of hacking attempts are simulated by this external penetration testing exercise.
To simulate “insider attacks” (e.g., guests entering the organization’s physical boundaries including wireless range, malicious staff or other insiders, and even the scope of access an attacker gains once the external defenses are breached), this Internal Penetration Testing Exercise is performed within premises. Focus is on workstations, internal applications, access controls, domains, and internal documents, to identify vulnerabilities of sensitive information and controls.
Information Assessment Service (IAS)
TrustCSI™
Security Device Migration Service
TrustCSI™
General Enquiry / Sales Hotline +852 2170 7401
Service Hotline +852 2331 8930
Copyright © 中信國際電訊(信息技術)有限公司 CITIC Telecom International CPC Limited
Thank you for your enquiry.