NETdepot's Penetration Testing Tool

VPENTEST

WHAT IS VPENTEST?

VPenTest is an annual penetration testing and vulnerability assessment subscription with up to 12 tests per year, offered for less than what most providers are charging for only one.


vPenTest allows organizations to perform a penetration test within their environment at any given time, satisfying compliance requirements and meeting security best practices. Results are turned around in 3 to 5 days instead of the typical 1 to 2 months. This gives you the ability to get comparison charts showing progress over time or areas of focus, giving you more control over board reviews.

Conquer the ongoing challenge of meeting compliance and security best practices.

OUR AUTOMATED PENETRATION TEST METHODOLOGY

vPenTest combines multiple methodologies that were once manually conducted into an automated fashion to consistently provide maximum value.

icon

EGRESS FILTERING TESTING

Automatically perform egress filtering to ensure that your organization is restricting unnecessary outbound traffic. Unrestricted outbound access can allow a malicious actor to exfiltrate data from your organization's environment.

icon

AUTHENTICATION ATTACKS

Upon the discovery of user account credentials, vPenTest will automatically attempt to validate those credentials and determine where they are most useful. This is a common process executed by both malicious attackers and penetration testers and is performed during privilege escalation.

icon

PRIVILEGE ESCALATION & LATERAL MOVEMENT

Using a valid set of credentials, vPenTest will attempt to identify valuable areas within your organization to identify where sensitive targets are.

icon

DATA EXFILTRATION

Critical data leaving your organization is an extremely serious concern. If access to confidential and/or sensitive data can be attained, vPenTest will simulate and log this activity to help your organization tighten areas that should restrict data exfiltration.

icon

SIMULATED MALWARE

With elevated access, vPenTest will attempt to upload malicious code onto remote systems to test the organization's end-point anti-malware controls.

TIMELY REPORTING

vPenTest generates an executive summary and technical and vulnerability reports within 3 to 5 days after the penetration test is complete. Our detailed deliverables will allow your network staff to cross-reference our activities with monitoring and alerting controls.

BENEFITS

  • No more scheduling conflicts with results turned around in 3-5 days.
  • Available whenever you need it and however often you need it.
  • Developed on a framework and methodology that changes and improves as the industry threats increase.
  • OSCP, CISSP, CEH, and OSCE certified consultants.
logo

KNOWLEDGABLE TOOL

Combining the knowledge, skills, logic, and toolsets of numerous consultants into one, vPenTest is the perfect solution to consistently satisfy your organization's needs for quality results.

icon

REAL-TIME ACTIVITY TRACKING

An important step to assessing your organization's risk is detecting and responding to malicious activities occurring within your environment. vPenTest creates a separate log file for every activity performed so you can correlate activities with your monitoring and logging solutions.

icon

MEET COMPLIANCE NEEDS & SECURITY BEST PRACTICES

By performing a quality network penetration test whenever you want and however often you want, vPenTest can assure your organization will continuously meet security best practices and compliance regulations.

ASSESSMENT CAPABILITIES

We offer two different automated penetration testing services to guide your organization to a better security posture and program.

INTERNAL NETWORK PENETRATION TEST

Using a device connected to your internal environment, our consultants will discover security vulnerabilities present within the internal network environment. These activities simulate that of a malicious attacker.

EXTERNAL NETWORK PENETRATION TEST

Assuming the role of a malicious attacker from the public Internet, our consultants will identify security flaws within your external network environment. These flaws can include patching, configuration, and authentication issues.

Interested?

Fill out this contact form.