Valiant�s approach to consulting will provide reliable information security consulting and training solutions to enterprises that will help in meeting the chosen security stance by: � understanding enterprise security requirements, � navigate the maze of national and global regulations, � identify vulnerabilities, � evolve mitigation plans
IS Consulting
Information Management
Reach us
Vulnerability Assessment and Penetration Testing
Penetration Testing
This is a powerful tool to test the security perimeter of an information system – both internal and external. Quite often referred to as ‘ethical hacking’ the process considers the vulnerabilities that are likely to be exploited by hackers and crackers. The primary objective of penetration testing is to provide a well considered and informed view of the strengths and weaknesses of the security systems, supporting such views with evidence of the vulnerabilities. Vulnerabilities will also be analyzed to determine appropriate countermeasures. Penetration Tests end with a report on the different levels of vulnerabilities uncovered by the test, including recommendations to resolve or mitigate these vulnerabilities, in order to reduce risks to an acceptable level in line with the risk appetite of management.
V-Tech Penetration Test Teams use procedures and techniques almost similar to what real hackers do, using automated tools and perform live penetration attempts by test team members. Depending on the nature of the network, a variety of conventional and unconventional penetration methods are adopted.