Learn exactly how vulnerable your most critical assets are to cyber attacks
drie’s Penetration Testing helps you strengthen your security by identifying vulnerabilities and misconfigurations in your security systems.
Duration: 10 to 15 days for set-up, 3 to 10 days a month ongoing
Our consultants will deploy advanced monitoring sensors on your network to check for malicious activity. We will build a bird’s eye view of what is happening on your network, what is the normal activity and monitor for any out of the ordinary occurrences. This is an ongoing service, providing 24/7 coverage for any security incidents that occur. If an incident is detected, we will immediately warn you and create a plan for catching and containing the threat to your network.
Duration: depending on incident, between 10 to 30 days
This service is of utmost importance if your company has been hacked. We will analyse all the available data to understand how the intruder got in, what data was leaked and what did the intruder do. We will write a detailed report on how to prevent incidents should as these from happening again, and help you secure your company from the intruder – remove them and ensure they do not get it again.
Vulnerability scan and external asset discovery
Duration: 3 to 10 days (depending on the number of hosts to scan)
A series of comprehensive automated scans that serve a dual purpose: to discovery the external assets of the company, and to perform a vulnerability scan of them. This is effectively a perimeter / firewall security overview, allowing the company to have a broad view of which hosts are exposed to the Internet and what is the risk and threat level of having those hosts exposed.
Application Penetration Test (white box and black box)
Duration: 5 to 20 days (depending on the number and size of applications to test)
Experienced consultant (ethical) hackers will perform a thorough security review and penetration test of one or more critical applications. The consultants will use advanced hacking techniques manually and with industry standard tools to attempt to subvert the security of these applications.
This kind of test is usually performed on the critical company assets, for example an externally facing web application used by clients and suppliers, or an internal business application which is essential for day to day work. The final report will detail each vulnerability that was found, what is its risk, and how it can be mitigated or resolved.
Network Penetration Test
Duration: 6 to 20 days (depending on the size of the network)
Employing similar techniques to the Application Penetration Test, our experienced consultants will probe, scan and exploit the target network or networks for security vulnerabilities, and deliver a report detailing what was found and how to fix it. This test is useful for companies that want to test a specific part of the network, such as for example an affiliate or branch network, or even to test their entire network.
Red Team Penetration Test
Let’s get started!
- Get started
- We are your devops team
We are hiring
- Managed Services
- Disaster Recovery
- Penetrations Testing
- Cloud Discovery
- Cloud Architecture
- What is cloud
- Cloud migration
- Cloud storage
- Cloud offers
- What is cloud computing
- What are cloud services
- Cloud technology
- Cloud hosting
- Cloud security
- Cloud services in Bahrain
- Cloud services in GCC
- Architechture security
- Disaster Recovery
© 2018, drie. All Rights Reserved.