PentestingPenetration testing services that encompass all aspects of isolating your threats, vulnerabilities & security weaknesses



What is Penetration Testing?


Penetration testing is the process of identifying security gaps in your overall corporate computing environment through simulating realistic attacks via automated and manual means. Essentially, a quality assurance check for your IT security and compliance program. Scheduling penetration scans with a value proposition on a routine basis should be part of any developing or mature security program.


Penetration Testing Services


At Praetorian Secure, our primary commitment is to provide our clients with actionable results and deliver a penetration test or security assessment that builds threat awareness through reliable metrics and detailed evidence. In the ever-changing IT security landscape CISOs and CIO can never sleep easy. Having a skilled penetration testing partner will provide a score card and risk dashboard for your security program.

The goal of each of these offerings is to access, identify and potentially exploit systems, applications and/or services through simulation of attacks within our client’s network. Once these areas have been discovered, our team will generate a thorough list of deliverables and reports that describes each area that was exploited or has potential to be exposed.

Overall our penetration testing mission is to provide our clients with accurate and timely information to assist in securing their internal data and business assets. Post engagement, our highly-trained staff will work with your team on developing remediation plan(s) that can address these crucial areas and in the end protect your critical data from inside and/or outside threats.

In addition, during the life-cycle of our project, we will strive to build confidence with your internal staff to address future network vulnerabilities, or addressing security issues early-on in the development process of your security program. To schedule a consultation or take advantage of our client services, contact us today to discuss your security requirements.


Penetration Testing Methodology


Praetorian Secure follows the Penetration Testing Execution Standard (PTES) for all of our PenTesting engagements.  In addition, the PTES methodology also meets PCI-DSS Version 3.0 requirements for Penetration Testing.  Started in 2009, PTES ensures that both businesses and security service providers share a common language and scope for performing Penetration Testing.  The following are the main sections defined by the standard:

  • Pre-engagement Interaction
  • Intelligence Gathering
  • Threat Modeling
  • Vulnerability Analysis
  • Exploitation
  • Post Exploitation
  • Reporting

If you care to learn more about our services, or the Penetration Testing Execution Standard (PTES) please feel free to contact us, or visit http://www.pentest-standard.org/index.php/Main_Page for more information on the methodology used by Praetorian Secure security engineers.


Value Proposition for Penetration Testing


  • Prevention of Data BreachesPenetration testing can determine where an organizations data is at risk. The process can mirror real world attacks against networks, application or web services providing an abundance of information for impacting your security posture and readiness against the persistent threats of cyber-criminals.
  •  Baseline Security Program Maturity – Independent third party validation of your security program with a baseline metric. Whether checking the effectiveness of your security program, verifying security program goals were met or gathering a risk profile penetration testing can provide the information needed. Depending on the timing beginning, middle or end of year. The results generated from a pen testing engagement can be formulated into metrics or used as a planning tool for annual security goals and risk determination.
  • Regulatory Compliance PCI-DSS Requirement 11.3 addresses penetration testing. At least annually and anytime there is a significant infrastructure or application upgrade or modification penetration testing should be performed.  In addition, PCI-DSS Version 3.0 (effective January 2014) now requires that Annual Penetration Testing be performed by an organization following an “industry-accepted penetration testing methodology.”
  • Verification of Layered Security ProtectionsToday’s tools provide insight into attack vectors and paths for verification or planning Defense in Depth (“DiD”) strategies.
  • Vulnerability Management PrioritizationSoftware patches are being released on almost a daily basis to improve security and fix bugs. Vulnerability scanners when operationalize and validated provide a wealth of information. The issue for companies with limited resources and demanding availability requirements is how do we schedule and prioritize. A Penetration test will provide information on which vulnerabilities were “exploitable”. Penetration testing results can provide the information needed to prioritize vulnerability mitigation leading to a reduction in risk.