Wireless devices have become the norm within corporate infrastructures to allow flexibility and ease of communication within a team orientated environment. Wireless devices are heavily targeted due to their broadcast proximity which can extend past your physical security perimeter.
Covert Threat’s team of experts assess your organizations wireless devices leveraging a comprehensive suite of technical tests designed to establish the security posture of your organizations wireless networking infrastructure. This assessment tests for all known vulnerability vectors against wireless networks which use standard wireless networking technologies (802.11, IR, Bluetooth).
Our vulnerability analysis stages are aligned with the following phases; device enumeration, signal vulnerability testing, authentication and access analysis and wireless bridge vulnerability flaws discovery.
• Satisfy PCI, HIPAA and NERC-CIP compliance
• To match up critical vulnerabilities with critical assets
• To identify all false-positives and false-negatives
• At least annually, recommended semi-annually
• After changes to your configurations or hardware
• Patch management remediation on discovered vulnerabilities
• AS OFTEN AS YOU LIKE
1. Define Scope
Detailed outline with the customer to define what assets are in scope.
4. Vulnerability Analysis
Utilize enterprise and custom scanning tools to uncover vulnerabilities.
2. Information Gathering
Map out the corporate infrastructure based on services, ports, hardware, software and operating system.
5. Reporting
Creation of Executive and Detail technical reports for both management and remediation team.
3. Threat Modeling
Determine mission critical and connected assets to corporate data through white, gray or black box approach.
6. Exit Call
Call scheduled with customers management and remediation team to explain in detail the findings and assist in remediation processes.
1. Define Scope
Detailed outline with the customer to define what assets are in scope.
2. Information Gathering
Map out the corporate infrastructure based on services, ports, hardware, software and operating system.
3. Threat Modeling
Determine mission critical and connected assets to corporate data through white, gray or black box approach.
4. Vulnerability Analysis
Utilize enterprise and custom scanning tools to uncover vulnerabilities.
5. Reporting
Creation of Executive and Detail technical reports for both management and remediation team.
6. Exit Call
Call scheduled with customers management and remediation team to explain in detail the findings and assist in remediation processes.
Network devices, Cloud infrastructure, Web applications, Wireless, Mobile applications and Internet of things devices
Network devices, Cloud, Wireless, Web application, Internet of things devices, Mobile applications, Social engineering, Continuous penetration testing and Active directory enumeration
CovertThreat is ready to assist with all your organizational security needs!
Our team of industry experts are ready to assess your organizational end-points to discover all possible security flaws.
Once we assess your organization for security flaws, our team provides the a detailed solution to eliminate the potential threat vectors. We work with you!
Florida – USA | Sydney – Australia