Cyber Security Testing

Tescom offers a wide range of cybersecurity “red team” testing services such as vulnerability assessments and penetration testing (VAPT). As a third-party service provider, we provide an independent view of your systems and data to verify that they are protected from misuse, compromise, information theft and potential cyber security attacks.

Cyber Security Testing

Security Configuration Review

Security configuration review is performed to ascertain that the system is configured and hardened appropriately based on the security design of the system.

Vulnerability Assessment (VA)

VA is to assess the security holes (vulnerabilities) in an application, operating systems, network and communications systems and infrastructure.

Penetration Test (PT)

PT is the process that exploits the vulnerabilities to determine whether unauthorized access or other malicious activity is possible and identify which flaws pose a threat.

Dynamic Application Security Test (DAST)

DAST is a black-box security testing activity in which the application is tested from the outside without login information to analyze a web-based application and identify potential security vulnerabilities.

Static Application Security Test (SAST)

DAST is a white-box security testing activity to analyze the source codes of the application and identify and exploit all application and code vulnerabilities.

Source Code Review

Source Code Review is a process of  conducting a systematic examination of the applications program source code to detect and remove vulnerabilities.

Security Risk Assessment

Security Risk Assessment allows an organization to view the application portfolio holistically from an attacker’s perspective and is an integral part of an organization’s risk management process. The risk assessment identifies, assesses and implements key security controls in the application. It also focuses on preventing application security defects and vulnerabilities.

Security Policy and Process Compliance

Security Policy and Process Compliance is a manual review of the current documentation relevant to industry ICT security policies, guidelines and standards together with interviews with the project team members before the system commissioning.

Security Testing Process

Security Testing Process

Security Accreditation & Certification

Tescom is accredited by CREST for both Vulnerability Assessment and Penetration Test, providing valuable credentials to our security testing services.

Tescom Crest VA PT logo
Scroll to Top