Tescom offers a wide range of cybersecurity “red team” testing services such as vulnerability assessments and penetration testing. As a third-party service provider, we provide an independent view of your systems and data to verify that they are protected from misuse, compromise, information theft and potential cyber security attacks.
SECURITY CONFIGURATION REVIEW
Security hardening review is performed to ascertain that the system is configured and hardened appropriately based on the security design of the system.
VULNERABILITY ASSESSMENT (VA)
Is to assess the security holes (vulnerabilities) in an application, operating systems, network and communications systems and infrastructure.
PENETRATION TEST (PT)
Is the process that exploits the vulnerabilities to determine whether unauthorized access or other malicious activity is possible and identify which flaws pose a threat.
DYNAMIC APPLICATION SECURITY TEST (DAST)
A black-box security testing activity in which the application is tested from the outside without login information to analyze a web-based application and identify potential security vulnerabilities.
STATIC APPLICATION SECURITY TEST (SAST)
A white-box security testing activity to analyze the source codes of the application, identify and exploit all application and code vulnerabilities.
SOURCE CODE REVIEW
A process to conduct a systematic examination of the computer program code to find and remove vulnerabilities.
SECURITY RISK ASSESSMENT
Allows an organization to view the application portfolio holistically from attacker’s perspective and an integral part of an organization's risks management process. Risk assessment identifies, assess and implement key security controls in the application. It also focuses on preventing application security defects and vulnerabilities.
POLICY AND PROCESS COMPLIANCE
Manual review of the current documentation relevant to industry ICT security policies, guidelines and standards and interview with the personnel before the system commissioning.
Tescom is certified by CREST for both Vulnerability Assessment and Penetration Test, providing valuable credentials to our security testing services.
CREST Credentials
Get in touch with us to learn more about our Cyber Security Testing services.
Contact Us