Details
PenTest PRO as-a Service
| Services | Startup | Enterprise | ||
| 1. Vulnerability Management | ||||
| Web | 24/7 vulnerabilities discovery, Triage, Reporting, security misconfigurations, malware detection, remediation management | 24/7 vulnerabilities discovery, Triage, Reporting, security misconfigurations, malware detection, remediation management | ||
| Cloud | - | Continuous real-time protection and agentless scanning of the multi-cloud environment against active exploitation, malware, and unknown threats. | ||
| API | - | Assessing and remediating risks to eliminate coding errors that can lead to data loss and business disruption | ||
| No. of Assets | 50 | 100+ | ||
| No. of Assessment Tools | 2 Automated scanners, 5+ manual scanners for web | 2 Automated scanners, 5+ manual scanners for web, 1 cloud scanner, 1 api scanner | ||
| Executive Report | Yes | Yes | ||
| Technical Report | Yes | Yes | ||
| SOC Analyst Support | 12/7 | 24/7 | ||
| 2. Compliance Audit | ||||
| Industry Compliance | PCI DSS, HIPAA, ISO 27001, SOC, | PCI DSS, HIPAA, ISO 27001, SOC, NISA and others | ||
| Executive Report | Yes | Yes | ||
| Auditor Report | - | Yes | ||
| 3. Application Security | ||||
| SAST | Scanning as you write the code, 100 languages and framework scans, real-time vulnerabilities scanning | Scanning as you write the code, 100 languages and framework scans, real-time vulnerabilities scanning | ||
| DAST | Finding and fixing runtime vulnerabilities in web and API | Finding and fixing runtime vulnerabilities in web and API | ||
| Container | - | Finding and fixing vulnerabilities in development process and speeding developer-led remediation, scanning IaC files such as Terraform, CloudFormation, Dockerfiles, Kubernetes manifests, Helm charts, AWS cloud formation, and Azure ARM templates | ||
| Executive Report | Yes | Yes | ||
| Technical Report | - | Yes | ||
| SOC Analyst Support | - | 24/7 | ||
| 4. DarkWeb Monitoring | ||||
| Deep & Dark Web Scanning | Scanning against IPs, domains, executives, emails, mailServers, API | Scanning against IPs, domains, executives, emails, mailServers, API | ||
| Threat Analysis | Chat rooms, marketplaces monitoring (against compromised/breached data) | Chat rooms, marketplaces monitoring (against compromised/breached data) | ||
| Compromised Endpoints Detection | - | Yes | ||
| Executive Report | Yes | Yes | ||
| Technical Report | - | Yes | ||
| SOC Analyst Support | - | 24/7 | ||
| 5. Social Engineering Assessment | ||||
| Phish Test | Mock phish attack campaign against users & staff | Mock phish attack campaign against users & staff | ||
| Tracking | Phishing reply tracking, tracking links clicked by users | Phishing reply tracking, tracking links clicked by users | ||
| Domain Doppelganger Testing | Discovering dangerous look-alike domains | Discovering dangerous look-alike domains | ||
| Mailserver Security Assessment | - | Testing mailserver against emails with attachments that contain password-protected, macro-zipped, and .exe files | ||
| Domain Spoof Testing | - | Yes | ||
| Network Test Against Ransomware | - | Yes | ||
| Awareness Training Program | - | Web-based custom program for staff and users | ||
| Executive Report | Yes | Yes | ||
| Technical Report | Yes | Yes | ||
| SOC Analyst Support | 12/7 | 24/7 | ||
Service Options
Customize PenTest PRO According To Your Business Challenges.
Download a PenTest PRO Proposal to learn more about five services’ key features, service duration, and other details. Fill out the form and get a copy of the proposal in your inbox.
