Penetration Test

If you have any regulations to comply with, such as PCI or ISO, or if you plan to take out a Cyber insurance or need to provide evidence of your security posture to your clients, the Penetration Test activity is something necessary. In any case, it is always useful to test the security of the external and internal network, and its components.

Learn more
PenetrationTest

What is the ReeVo Penetration Test Service

It is a two-step service carried out initially by an Ethical Hacking team, which physically does the testing, and completed by the CSIRT team that includes the risk analysis component and prepares the final report to be delivered.

The simplest Penetration Test is the one that can be conducted in external or blackbox mode, simulating attacks by those unfamiliar with the systems. There is also an internal variant that - with a set of information on what the systems and network are like - tries to attack the system.

The advantages ReeVo offers you

With ReeVo you decide the perimeter of action during the test. The external mode - blackbox - is the least invasive. The internal mode, which involves revealing more information about your architecture and its components, can also give you an idea of the level of compromise an attacker of your systems can reach, for instance in the case of a compromised client or server or a user who has opened a file or clicked on a malicious link.

We can of course carry out sporadic testing activities.

However, for ReeVo, the Penetration Test is something preparatory to a Cyber Risk Assessment, in order to make a complete assessment of the entire infrastructure. In the reports we provide you with, we already include some additional risk analysis information, which is part of a broader risk assessment activity.

If you choose, you can always decide not to limit yourself to the Penetration Test, but to conduct a 360-degree exploration of your cyber risks together with ReeVo.

Every test activity is pre-concerted with you, in timing and manner.

If we highlight critical situations, we immediately notify you, obviously without exploiting the vulnerability found.

The ReeVo team follows specific processes and standards. We operate within the guidelines of the OSSTMM (Open Source Security Testing Methodology Manual) and OWASP (Open Web Application Security Project) standards, always in their most up-to-date versions. 

Are you aware of how exposed you are to cyber risks?

A concerted service for risk exposure assessment of external, internal and component networks

An activity performed according to specific processes and standards and preparatory to a comprehensive assessment of your cyber risks.

rvo-banner-02

Get in touch with us now if you want to understand how to provide security evidence of your systems