NETWORK &
WIRELESS
Assesses policies and practices to prevent unauthorized access to private or public networks and network-accessible resources.
WEB
APPLICATION
Identifies security vulnerabilities in web applications and their source code through front-end automated scans or performs dynamic or static analysis of code.
HOST-BASED
Performs an in-depth evaluation of systems and networks (critical servers) for identifying security weaknesses.
SECURITY
CONFIGURATION
Identifies vulnerabilities in the configuration of your infrastructure, including Firewall/WAF, DLP security matrix, and network hardware.