Integrated Business Technology Solutions

Security Services

IBT Solutions Penetration Testing Services

A penetration test, or pen test, "is a method of evaluating the security of a system or network by simulating an attack from malicious outsiders (who do not have an authorized means of accessing the organization's systems) and malicious insiders (who have some level of authorized access)."

The process involves an active analysis of the system for any potential vulnerabilities that could result from poor or improper system configuration, both known and unknown hardware or software flaws, or operational weaknesses in process or technical countermeasures.

At IBT Solutions this analysis is carried out from the position of a potential attacker by our Security consultants and can involve active exploitation of security vulnerabilities with a view to improving the security of your system or network. We can provide this service on its own or as part of our Security Assessment and Audit service.

Security issues uncovered through the penetration test are presented to the system's owner. Effective penetration tests will couple this information with an accurate assessment of the potential impacts to the organization and outline a range of technical and procedural countermeasures to reduce risks..

Why do a Pen test?

  • Determine the feasibility of a particular set of attack vectors
  • Identify higher-risk vulnerabilities that result from a combination of lower-risk vulnerabilities exploited in a particular sequence
  • Identify vulnerabilities that may be difficult or impossible to detect with automated network or application vulnerability scanning software
  • Assess the magnitude of potential business and operational impacts of successful attacks
  • Test the ability of network defenders to successfully detect and respond to the attacks
  • Provide evidence to support increased investments in security personnel and technology

Security Assessments & Audits

IBT Solutions computer security audits are a complete assessment of your critical systems and applications. We focus on the people, processes, procedures and technology to ensure that a complete review identifies any threats, and makes recommendations on how to minimise or eliminate any potential risks to the security of your organisation.

Our Service includes

  • Staff interviews
  • Vulnerability scans
  • Review of applications and operating system access controls
  • Analyzing physical access to the systems.
  • System generated audit reports
  • The use of software to monitor and report changes to files and settings on a system.

Our Security consultants are experts in their fields and have the experience gained through years of providing these services to many "blue chip" organisations.

At IBT Solutions IT Security is not just a once off assignment it is a way of working that is ingrained in our DNA.