SERVICE
PENETRATION TESTING
Service combining advanced technologies from USA, Israel
VNCS uses US BigData-based monitoring technology, combined with US vulnerability detection and management technology and APT attack detection technologies from the US and anti-denial of service attacks from Israel.
Experienced staff with high qualifications
VNCS owns a team of experts with many years of experience in the field of Information Security, well-trained in the field of information security, along with security certificates from famous organizations Eccoucil, SANS… Besides, the support from the company’s senior experts in the US, Japan and Israel
Effectively operate the deployment process according to Japanese standards
VNCS operates Operational Procedures and Quality Management from Japan. Processes that are operated and monitored are tailored to each organization and are compliant with ISO policies and international standards. The troubleshooting process is coordinated by VNCS with domestic and foreign information safety management organizations.
Outstanding service quality
- All assessments are carried out according to international standards for information security.
- The assessment is carried out by engineers and experts in VNCS’s Attack team.
- With the support of leading experts working in government, financial and banking organizations in Vietnam and Germany, Israel, Malaysia, and Japan, the system will be dissected from every angle to find the smallest loopholes but do not affect the running system.
- Committed to keeping the absolute confidentiality of customer information, not disclosing or losing any information.
- Maintenance and support services will satisfy all customers.
Fast and effective method of implementation
- Each service package will be implemented according to different processes. Evaluation methods and tools will be published after the evaluation process.
- Various methods and well-known tools (5-20 tools/package) will be used to in-depth assessment and analysis of every aspect of the system.
- The manual (manual) attack process will be performed by experts to detect the remaining vulnerabilities and take full advantage of the vulnerabilities.
- The report will be developed based on the results of cross-review of all the above methods and final validation by experts.
- There are two types of reports that will be produced: Management reports and technical detail reports. The report to the management will clearly indicate the current state of the system, recommendations should be made to improve the system’s defenses. In the technical report will detail the implementation process, tools and detailed results and recommendations to reset the system to the best security level.
Optional service packages:
- Check out web app review
- Check mobile and desktop apps reviews
- Check the database system rating
- Check the service server system rating
- Check out network and security device reviews
- Check the wireless network system rating
- Check overall safety rating