Cyber Assessment

Vulnerability Assessment and Penetration Testing

A 9DSS Cyber Assessment involves a  Vulnerability Assessment which can be combined with a Penetration Test for a comprehensive evaluation of organizational risks.  Additionally, the assessment identifies the various information assets that could be affected by a cyber attack (such as hardware, systems, laptops, customer data and intellectual property), and then identifies the various risks that could affect those assets.  Together, penetration testing and vulnerability assessment tools provide a detailed picture of the flaws that exist in an application and the risks associated with those flaws.

Cyber Assessment is the process of identifying, analysing and evaluating risk – is the only way to ensure that the cyber security controls you choose are appropriate to the risks your organisation faces.

 9DSS risk estimation and evaluation is followed by the selection of controls to treat the identified risks. It is important to continually monitor and review the risk environment to detect any changes in the context of the organisation, and to maintain an overview of the complete risk management process.

Vulnerability Assessment

A vulnerability assessment is the process of finding and measuring the severity of vulnerabilities in a system. Vulnerability assessments yield lists of vulnerabilities, often prioritized by severity and/or business criticality.

Vulnerability assessments typically involve the use of automated testing tools such as web and network security scanners, whose results are typically assessed, and escalated to development and operations teams. In other words, vulnerability assessments involve in-depth evaluation of a security posture designed to uncover weaknesses and recommending appropriate remediation or mitigation to remove or reduce risk.

9DSS performs vulnerability assessments in accordance with “best-in-class” practices as defined by ISECOM’s Open Source Security Testing Methodology Manual (OSSTMM) and the Open Web Application Security Project (OWASP). Our experts use both automated tools and manual techniques to identify vulnerabilities that threaten to compromise the security of sensitive information protected by a client’s infrastructure, policies and processes.

Penetration Test

Penetration testing is a controlled process which simulates a real-world attack from malicious users. The test aims to identify vulnerabilities that may allow an attacker to bypass the application’s security mechanisms and gain unauthorized access.

Penetration testing helps to proactively identify vulnerabilities, validate existing controls and develop guidelines for remediation. Maintaining information security and taking timely measures can ultimately save thousands of dollars in potential losses, prevent damage to reputation and customer confidence, avoid business disruptions, and more.

9DSS performs penetration testing monthly, quarterly or annually, as preferred by the client. Our security engineers use both automated tools and manual techniques to identify and validate exploitability of vulnerabilities that may result from a poor or improper system configuration, known software flaws, operational process weaknesses, or other causes.

9DSS performs the following types of a penetration test:

  • Network services test
  • Web application security test
  • Client-side security test
  • Remote access security test
  • Social engineering test
  • Physical security test

Company

Who We Are
Social Responsibility
Careers
Executive Team

© 9 Dot Security Solutions, All Rights Reserved. Privacy Policy | Sitemap

Services

Managed Services
Security Consulting
PCI Compliance
Professional Services
Forensic Services

Links

Resources
Industry News

Contact Us

2250 Riverwood Pkwy, Suite 1900
Atlanta, GA 30339
404-919-4774
info@ninedss.com