Our clients trust us to support them in:

1
Securing their applications and networks & managing their security function.
2
Uplifting capability by training and educating their staff & helping them stay compliant.
3
Protecting their most valuable assets and offering a seamless experience for their end users.

Network Penetration Testing

Network Penetration Testing can be executed either on your extramural facing network / perimeter or your domestic network. We conduct both internal and external network penetration tests for our clients. The goal is to identify known vulnerabilities in your network and eliminate the same by using multi test confirmations and experts based testing.

Network Penetration Testing is recommended periodically and is distinct from a vulnerability scan in the fact that an expert penetration tester is involved in studying your network, analysing the results and doing course corrections on the fly to break into your network. The penetration test includes the option of eradicating discovered vulnerabilities.

 

Vulnerabilities

Vulnerabilities in web applications are responsible for some of the most high profile data breaches today. Not only that, a compromised web application can host stored Cross Site Scripting (XSS) which can be used to target the browser of every single visitor to your site. Such vulnerabilities can cause reputation risk if not dealt with.

Indetics web application penetration testing service will enable your business to identify and overcome vulnerabilities discovered in your web application resulting in reducing risk and providing assurance to your brand, reputation and customers.

 

 

Web Application Testing Methodology

  • Injection
  • Broken authentication and session management
  • Insecure direct object references
  • Cross-site scripting (XSS)
  • Security misconfiguration
  • Sensitive data exposure
  • Missing function level access control
  • Using components with known vulnerabilities

What You Get
1. Expert security consultation throughout the engagement from end-to-end solutions.
2. A comprehensive report with an executive summary and a prioritised list of risk vulnerabilities with prioritised remedies detailing of occurrence and fixation of risk.
3. . A manual re-test of post remedial vulnerabilities to assure the closure of vulnerabilities.

 

Phishing Protection and Advanced Email Security

Over 90% of the data breaches start with a single phishing email, and the most common cyber security threat in India is phishing. We can protect your organisation from the latest and the most sophisticated phishing threats.

To minimise your users potentially compromising organisational security, we provide the following services:

Email phishing: Users will be sent misleading email tempting them to run potentially malicious software.
Phone: A social engineering specialist will call multiple users and attempt to gain information, passwords and access to the user system.
USB Drop: A social engineering specialist will fix USB sticks in customer’s premises containing specialised software. This software will alert Content Security, if the USB is inserted into a system and run.
Physical Intrusion: Security consultants will attempt to break into a customer location through tailgating, social engineering, and manipulation of access control systems.