HACKNER Security Intelligence offers comprehensive IT Penetration Tests. Our security experts use state-of-the-art technology and international best-practice standards to identify and exploit vulnerabilities in your IT infrastructure. They have extensive experience in testing different IT systems, such as
- websites, network infrastructures, Windows domain infrastructures, Linux server, PKI, mobile apps,
- smart cards, mobile devices, near field communication (NFC),
- industrial SCADA systems, transportation networks, and
- building management systems, including access control and alarm systems.
The assessment is executed by specialized and certified professionals. The identified vulnerabilities are categorized by risk in a detailed management and technical report. In addition, the report contains recommendations to minimize the risks.
With our Social Engineering Test, HACKNER Security Intelligence explores how vulnerable your company is to these attacks and how well your security protocols function in practice. The test is meant as a learning process for both management and employees and should ideally be followed up on with a security awareness training. Among the social engineering techniques that are used are: Malicious USB dropping, (Spear) Phishing, Piggybacking, Dumpster Diving, and Phone Elicitation. he report combines the findings with calculated risks and recommendations.
The Physical Security Penetration Test reviews the effectiveness of your physical security measurements, such as locks, surveillance and alarm systems, but also alarm communication and reaction time on incidents. All successfully identified vulnerabilities are put together in a final report, which describes the issues, calculates the risk, and contains a recommendation on how to mitigate these issues.