ICI Global Cyber Security Services

Why ICI for Vulnerability & Penetration Assessments?

Vulnerability assessments and penetration testing provides enterprises with a comprehensive evaluation of their cybersecurity posture. Vulnerabilities can be found across the enterprise that would allow hackers access to critical systems or critical data, which, if exposed, could have enormous negative repercussions.


  Contact Us

Vulnerability & Penetration Assessments

Vulnerability and penetration testing provides a full list of flaws and potential exploits found in the enterprise along with the degree of risk posed by each flaw. ICI Global Cyber Security provide in-depth reporting of found vulnerabilities in many areas including software and hardware backdoors, encryption weaknesses, virtual private network (VPN) weaknesses, local network mapping and vulnerability, service route discovery and documentation, wireless LAN route exploitation, wireless LAN PSK & encryption weaknesses, denial of service resilience, firewall discovery & potential exploitations and more. All reports consist of findings, classified as low, medium, high, and critical risk, and suggested remediation steps.


All ICI Global Cyber Security vulnerability and penetration testing consists of two phases. Phase 1 is a remote assessment both from the external side of the business as well as an internal assessment with onsite assistance. Phase 2 is a physical inspection of systems, networks, connectivity, access controls, configuration management, and security policy review on site at the customer’s location.


Vulnerability assessments and penetration testing raises executive awareness and visibility of corporate liability in regards to cybersecurity and data protection. It validates the effectiveness of current security safeguards and can justify budgetary requirements of enterprise cybersecurity architecture planning. It provides detailed remediation steps to prevent network intrusions and critical data loss. It supports industry and governmental compliance regulations and initiatives.


Standard Phase 1 Assessment

A typical ICI Global Cyber Security Phase 1 remote assessment produces a report with information about vulnerabilities that can be found in some of the following areas:

  • VPN Penetration
  • Edge Firewall Configuration Testing
  • End-Point & Port Discovery
  • Local Area Network Topography Mapping
  • Service Route Discovery
  • Wireless LAN Route Exploitation
  • Edge Router Penetration & Exploitation
  • Wireless LAN PSK Encryption Exploitation
  • DDoS Resilience

Benefits

ICI vulnerability assessments and penetration testing raises executive awareness and visibility of corporate liability in regards to cybersecurity and data protection. It validates the effectiveness of current security safeguards and can justify budgetary requirements of enterprise cybersecurity architecture planning. It provides detailed remediation steps to prevent network intrusions and critical data loss. It supports industry and governmental compliance regulations and initiatives.