for different types of networks and organizations
what is
how we work
On the Pre-engagement phase we'll discus the type of testing you would like to get (Vulnerability Assessment, Penetration Testing, Automated Scan), the scope of testing, schedule, reporting, contact points and so on.
During the Security Testing phase we'll identify a web application security weaknesses. The testing process is based on OWASP Application Security Verification Standard and OWASP Web Security Testing Guide.
Reporting phase embrace collecting all findings and formatting them for presenting. Depending on agreement on the first phase it migh be document, presentation, or tickets in your bug tracking system (like JIRA). All findings will be risk and severity classified. Also we'll provide remediation and development best practices to eliminate such kind of issues in the future. Download Web Application Sample Report.
In this phase we'll verify security fix implementation for discovered issues to prevent exploiting weakness in the fix.
On the Pre-engagement phase we'll discus the type of testing you would like to get (Vulnerability Assessment, Penetration Testing, Automated Scan), the scope of testing, schedule, reporting, contact points and so on.
During the Security Testing phase we'll identify a web application security weaknesses. The testing process is based on OWASP Application Security Verification Standard and OWASP Web Security Testing Guide.