NETWORK &
WIRELESS

Assesses policies and practices to prevent unauthorized access to private or public networks and network-accessible resources.

WEB
APPLICATION

Identifies security vulnerabilities in web applications and their source code through front-end automated scans or performs dynamic or static analysis of code.

HOST-BASED
 

Performs an in-depth evaluation of systems and networks (critical servers) for identifying security weaknesses.

SECURITY
CONFIGURATION

Identifies vulnerabilities in the configuration of your infrastructure, including Firewall/WAF, DLP security matrix, and network hardware.