Testing

Vulnerability Assessment

Security vulnerabilities may exist in networks, operating systems and applications. An external vulnerability scan looks for security weaknesses from outside the customer’s network, scanning the public-facing IP addresses. On the other hand, an internal vulnerability scan is run across the customer’s network and it scans lists of internal IP addresses for weaknesses. The scanning procedure is automated and utilises a huge database of known vulnerabilities. Often an organisation will require both types of assessment, on a periodic basis. A detailed report is produced which organises the discovered vulnerabilities and gives information about them. If required, a security expert can run through the findings with the client, to further explain and advise.

A vulnerability scan does not exploit weaknesses that are discovered and go deeper to examine the implications of those weaknesses for the business - for example to discover what kind of data could be compromised as a result of a vulnerability. That kind of service is provided in a penetration test, as opposed to a vulnerability assessment.

Vulnerability-Assessment

How can Titan Help?

Titan can arrange all types of external and internal vulnerability scanning on a one-off or repetitive basis, together with consulting as required. Quotes are issued promptly after scoping by Titan or its services vendor. Urgent projects can often be accommodated.

This service package is sold via Titan’s reseller or MSP to the end-client, while the services themselves are provided directly by the service vendor to the end-client.

Contact us to find out how Titan can help your customers with Vulnerability Scanning, or to arrange a call and demo

Penetration-Test

How can Titan Help?

Titan can arrange all types of penetration testing on a one-off or repetitive basis, together with follow-up consulting as required. Quotes are issued promptly after scoping by Titan or its services vendor.

This service package is sold via Titan’s reseller or MSP to the end-client, while the services themselves are provided directly by the service vendor to the end-client.

Penetration Testing

A penetration test designed to discover how an attacker could step-by-step penetrate a customer’s systems, and the business context of such attacks, for example in terms of data or other resources that could be compromised. The detailed report is a valuable tool in satisfying risk management process requirements and delivering assurance to stakeholders, as well as in highlighting important actions that may be required. The penetration test is not however designed to deliver a full list of known vulnerabilities – that is the task of the separate vulnerability assessment.

A typical penetration test involves steps of reconnaissance, target enumeration, vulnerability mapping, target exploitation, privilege escalation, maintaining access, lateral movement, clean-up and reporting. “Grey-box” penetration tests are often considered the most cost-efficient option, where the attacker is given some limited information about the target systems, but black-box (no information) and white-box (full information) are also possible.

An “external infrastructure penetration test” will attack the network from outside, while an “internal infrastructure penetration test” takes place from within the client network. The internal penetration may be used to test resilience to the case where an attacker has already established a presence within the client network.

A “web application penetration test” follows penetration testing methodology in relation to a client’s web application - a discovery phase is followed by active testing, including testing against the OWASP1 top 10 web application security risks as well as other manual testing.

A “wifi penetration test” will highlight weaknesses in a wifi network. This test can be done remotely, if required, by deployment of a security device.

A “social engineering” penetration test will test the resilience of the client’s employees to social engineering attacks, including all kinds of phishing attacks, whereby the employees could be conned into actions that cause cybersecurity threats or other damage. These tests can also be linked to online training, which is triggered by the employee falling for an attack.

Contact us to find out how Titan can help your customers with Penetration Testing, or to arrange a call and demo

Scroll to Top