top of page

Penetration Testing 

Security is not a single point solution, but a process that requires due diligence.
Penetration Testing or “Ethical Hacking” services will aid your organization to better understand its current security posture by identifying gaps in security. This enables your organization to develop an actionable plan to minimize the threat of attack or misuse. A well documented penetration test helps managers in creating a strong business case to justify a needed increase in the security budget or make the security message heard at the executive level.

External Infrastructure

The external infrastructure are the Web servers, Domain Name Servers, email servers, VPN access points, perimeter firewalls, routers, etc. that are publicly accessible from the Internet. Commonly the external infrastructure is considered to be the main target of attacks. Possible attackers are both human hackers as well as automated worms. It is vital for any business to guard itself from unwanted intruders and attackers while at the same time continue serving customers as well as other modern business needs.

Internal Infrastructure

It is vital for any organization to be equally aware of the threats internally as well as externally. It is unfortunate, but even inside the safe work environment threats do exist for the IT infrastructure of most organizations and have surpassed external threats. Viruses, Worms, Trojans and disgruntled employees are a danger to the inner workings of a corporation. As modern networks get more diverse and multi-layered, it’s common for a number of issues to exist internally that could prove disastrous, varying from accidental incidents to corporate espionage.

Web Application Testing

For the past few years and even more so now with the introduction of what is known as “Web 2.0”, more and more applications are moving on-line, and are increasingly becoming the targets of malicious attackers. All of our testers are experts in various programming languages and web technologies that can investigate and detect issues with both on-line and off-line applications before an attacker does. This vulnerability assessment includes the connection requests to the data bases, dynamic forms, users sessions, authentication and authorizations management, etc.

Vulnerability Assessments

A Vulnerability Assessment is an automated scheduled task that provides a basic to advanced overview of the client’s external or internal infrastructure. DSolution makes sure all reports have been double checked by one of our skilled professionals, therefore providing accurate Vulnerability Assessment reports.

bottom of page