The best way to study the systems security against an attack is to experience one, but in a controlled and ethical way. In this type of analysis, apart from discovering the vulnerabilities in the computers, such vulnerabilities are exploited in order to assess the real impact of each of them and their specific danger in their environment.
A2SECURE provides Pentesting services, working accordingly to standards such as OSSTM, OWASP, PCI-DSS, NIST, and other regulatory frameworks.
Whether it is because of the company policy, to comply with existing standards such as PCI-DSS or simply to know the exact security status of our infrastructure, the implementation of Pentesting allows us to know our security status and to establish an improvement plan to mitigate risks which already exist as they have been exploited.
A Pentesting is a means to discover vulnerability and its exploitation in order to accurately assess the extent of the problem. That is, finding ways of information leakage, unauthorized access to restricted areas, and so on.
This activity can be addressed through different perspectives, which give more or less ease to the pentester team in terms of access to the initial information which the client may provide. The different types of pentesting are “black box”, “grey box” and “white box”.
Validations to be performed in such projects depend on their scope, which may include among others:
- FW rules checks
- Analysis of segmentation
- Discovery and exploitation of system vulnerabilities
- Discovery and exploitation of application vulnerabilities
- Code review
- Password cracking
- Discovery of users and impersonation
We always work closely with our clients providing information at all times about our actions and discoveries. For us, working closely with our clients is the best way to understand and help them.
Results and Benefits
The penetration test services are tailor-made projects for our clients. Thus, our work begins and ends where the client requires, either with:
- Technical outcomes report
- Executive reporting
- Presentation of results meetings and workshops
- Training sessions aimed at understanding the deficiencies found
- Remediation period support
- Validation of remediation
The benefit of this type of service is to know what are the real possibilities for our systems in the event of an attack before it actually occurs. This knowledge allows us to anticipate and remedy the breaches found by correcting their causes.
“The security of our IT environment is a concern for us; it is difficult for us to have an overall view of our various hotels and their related facilities. Working with A2SECURE we have that view, and we know how to improve day by day.”
Occidental Hotels Deputy Technical Director of Systems and Communications
“A telecommunications operator for professionals like Neosky, can not only offer the best connections. Giving added value to our services is a necessity and for our clients’ perimeter security we trust in A2SECURE.”
NeoSky Senior Product Manager
“ Like all companies every day we are more dependent on the Internet. Having someone externally valuing our security and helping us to improve is very important for us and that is precisely what A2SECURE offers”
UNIPOST Organization and Systems Director
“ For eDreams, as low-cost flights leader, security is a key issue. That is why we work with A2SECURE”
eDreams ODIGEO CTO
“ A2SECURE has made the work of auditing our network much easier. A2 team takes care of this nightmare”
Azucarera Ebro IT Systems Director
“ We evaluated other partners who could support us in improving our security and we have finally chosen A2SECURE, because it combines the best solution with a very personal and direct support”
Atrapalo IT Director
What makes us different?
A2SECURE has a highly qualified team to develop Ethical Hacking/Pentesting activities supported by various international certifications. But our trademark is our vocation to make our clients understand our results.
A pentesting activity is really useful when the client is able to understand what has been found, the risks it implies and how it has been possible to get there. The latter is the key point: knowing how a successful attack has been possible, understanding if it is necessary to implement additional control and change an internal process that is causing breaches. In short, taking advantage of the exercise transforming it into improvements for the company.