{"id":550,"date":"2021-05-05T13:14:42","date_gmt":"2021-05-05T06:14:42","guid":{"rendered":"http:\/\/proctiv-security.com\/?page_id=550"},"modified":"2024-01-05T13:08:30","modified_gmt":"2024-01-05T06:08:30","slug":"it-security-assessment","status":"publish","type":"page","link":"https:\/\/proctiv-security.com\/?page_id=550","title":{"rendered":"IT Security Assessment"},"content":{"rendered":"[vc_row type=&#8221;full_width_background&#8221; full_screen_row_position=&#8221;middle&#8221; bg_image=&#8221;943&#8243; bg_position=&#8221;left top&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_color=&#8221;#035a8d&#8221; scene_position=&#8221;center&#8221; video_bg=&#8221;use_video&#8221; video_mute=&#8221;true&#8221; text_color=&#8221;light&#8221; text_align=&#8221;left&#8221; top_padding=&#8221;5%&#8221; bottom_padding=&#8221;2%&#8221; overlay_strength=&#8221;0.3&#8243; shape_divider_position=&#8221;bottom&#8221; shape_type=&#8221;&#8221;][vc_column centered_text=&#8221;true&#8221; column_padding=&#8221;no-extra-padding&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; width=&#8221;1\/1&#8243; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_custom_heading text=&#8221;IT Security Assessment&#8221; font_container=&#8221;tag:h1|text_align:center&#8221; use_theme_fonts=&#8221;yes&#8221;][\/vc_column][\/vc_row][vc_row type=&#8221;full_width_background&#8221; full_screen_row_position=&#8221;middle&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; top_padding=&#8221;20&#8243; bottom_padding=&#8221;20&#8243; overlay_strength=&#8221;0.3&#8243; shape_divider_position=&#8221;bottom&#8221; shape_type=&#8221;&#8221;][vc_column enable_animation=&#8221;true&#8221; animation=&#8221;fade-in&#8221; column_padding=&#8221;no-extra-padding&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; width=&#8221;1\/2&#8243; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_row_inner column_margin=&#8221;default&#8221; text_align=&#8221;left&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; width=&#8221;1\/1&#8243; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]Our IT Security Assessment services or commonly known as Penetration Test is our most favourable services by most of our clients. Penetration test is a proactive process perform by independent expert security auditors in order to identify vulnerability gaps in an organisation security posture by using combinations of automated and manual methods of exploiting vulnerability within your IT infrastructure, web applications and human aspect. With penetration test, an organisation will recognise its weakest point in their security architecture so necessary countermeasure and fixes can be put in place in order to minimise security risk in their IT infrastructure and web applications[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner column_margin=&#8221;default&#8221; text_align=&#8221;left&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; width=&#8221;1\/1&#8243; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]Once our security auditors have identified a vulnerability point, necessary steps or what we call &#8220;a proof of concept&#8221; will be executed to identify whether the vulnerability is a false positive or otherwise true positive. If it is a true positive, then we will report it to our client and recommend necessary steps to close it. At the end, our deliverable for this service is a set of report containing our findings and recommendations on how to close those findings.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column enable_animation=&#8221;true&#8221; animation=&#8221;fade-in&#8221; column_padding=&#8221;no-extra-padding&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; width=&#8221;1\/2&#8243; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_custom_heading text=&#8221;There are 3 types of IT security assessment, they are cotegorize into:&#8221; font_container=&#8221;tag:h2|font_size:25|text_align:left|line_height:1.5&#8243; use_theme_fonts=&#8221;yes&#8221; css=&#8221;.vc_custom_1704407843266{padding-bottom: 10px !important;}&#8221;]<div class=\"nectar-fancy-ul\" data-list-icon=\"icon-chevron-right\" data-animation=\"true\" data-animation-delay=\"0\" data-color=\"accent-color\" data-alignment=\"left\"> \n<ul>\n<li><strong><big style=\"font-size: 24px; color: #444;\">Network infrastructure security assessmen<\/big><\/strong><br \/>\nWith network infrastructure penetration test, we can help to identify common and uncommon vulnerabilities within your network environment. We used a combination of known standards in the field of penetration test to such as: ISSAF, PCI-DSS, OSSTMM, etc in order to execute this task. Most common subjects to penetration test in this scope are: OS Servers, Wireless network, Network devices, Network security devices, LAN and Communication devices.<\/li>\n<\/ul>\n <\/div><div class=\"nectar-fancy-ul\" data-list-icon=\"icon-chevron-right\" data-animation=\"true\" data-animation-delay=\"0\" data-color=\"accent-color\" data-alignment=\"left\"> \n<ul>\n<li><strong><big style=\"font-size: 24px; color: #444;\">Web Based Application security assessment<\/big><\/strong><br \/>\nWeb application security assessment is a way to identify common and uncommon vulnerabilities within an organisation web based application. We will emulates common and uncommon attacks to a web based application in order to test its security control and its supporting infrastructure (Web apps firewall, etc) to see whether or not it is vulnerable to a common attack technique. Once we find a vulnerability, we will execute exploits in order to perform a \u201cproof of concept\u201d. Our web based application security assessment follows standards from OWASP, PCI-DSS, etc.<\/li>\n<\/ul>\n <\/div>[\/vc_column][\/vc_row][vc_row type=&#8221;full_width_background&#8221; full_screen_row_position=&#8221;middle&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; bg_color=&#8221;#035a8d&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;light&#8221; text_align=&#8221;left&#8221; top_padding=&#8221;15&#8243; bottom_padding=&#8221;15&#8243; overlay_strength=&#8221;0.3&#8243; shape_divider_position=&#8221;bottom&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; width=&#8221;2\/3&#8243; tablet_text_alignment=&#8221;center&#8221; phone_text_alignment=&#8221;center&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_custom_heading text=&#8221;Reach out with any questions you have&#8221; use_theme_fonts=&#8221;yes&#8221;][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_position=&#8221;right&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; width=&#8221;1\/3&#8243; tablet_text_alignment=&#8221;center&#8221; phone_text_alignment=&#8221;center&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_row_inner column_margin=&#8221;default&#8221; text_align=&#8221;right&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; width=&#8221;1\/2&#8243; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;]<div class=\"divider-wrap\"><div style=\"height: 10px;\" class=\"divider\"><\/div><\/div>[nectar_btn size=&#8221;large&#8221; button_style=&#8221;see-through&#8221; button_color_2=&#8221;Accent-Color&#8221; color_override=&#8221;#ffffff&#8221; icon_family=&#8221;none&#8221; el_class=&#8221;cntct&#8221; url=&#8221;https:\/\/proctiv-security.com\/?page_id=327&#8243; text=&#8221;Contact Us&#8221; margin_bottom=&#8221;0&#8243; margin_top=&#8221;0&#8243;][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; width=&#8221;1\/2&#8243; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;]<div class=\"img-with-aniamtion-wrap center\" data-max-width=\"100%\" data-border-radius=\"none\"><div class=\"inner\"><a href=\"https:\/\/wa.me\/628\" target=\"_blank\" class=\"center\"><img loading=\"lazy\" decoding=\"async\" data-shadow=\"none\" data-shadow-direction=\"middle\" class=\"img-with-animation \" data-delay=\"0\" height=\"60\" width=\"60\" data-animation=\"fade-in\" src=\"https:\/\/proctiv-security.com\/wp-content\/uploads\/2024\/01\/WhatsApp_icon-e1704337943595.png\"  alt=\"\" \/><\/a><\/div><\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;full_width_background&#8221; full_screen_row_position=&#8221;middle&#8221; bg_image=&#8221;943&#8243; bg_position=&#8221;left top&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_color=&#8221;#035a8d&#8221; scene_position=&#8221;center&#8221; video_bg=&#8221;use_video&#8221; video_mute=&#8221;true&#8221; text_color=&#8221;light&#8221; text_align=&#8221;left&#8221; top_padding=&#8221;5%&#8221; bottom_padding=&#8221;2%&#8221; overlay_strength=&#8221;0.3&#8243; shape_divider_position=&#8221;bottom&#8221; shape_type=&#8221;&#8221;][vc_column centered_text=&#8221;true&#8221; column_padding=&#8221;no-extra-padding&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; width=&#8221;1\/1&#8243; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_custom_heading&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-550","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/proctiv-security.com\/index.php?rest_route=\/wp\/v2\/pages\/550","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/proctiv-security.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/proctiv-security.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/proctiv-security.com\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/proctiv-security.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=550"}],"version-history":[{"count":38,"href":"https:\/\/proctiv-security.com\/index.php?rest_route=\/wp\/v2\/pages\/550\/revisions"}],"predecessor-version":[{"id":1420,"href":"https:\/\/proctiv-security.com\/index.php?rest_route=\/wp\/v2\/pages\/550\/revisions\/1420"}],"wp:attachment":[{"href":"https:\/\/proctiv-security.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=550"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}