Details
PenTest PRO as-a Service
Services | Startup | Enterprise | ||
1. Vulnerability Management | ||||
Web | 24/7 vulnerabilities discovery, Triage, Reporting, security misconfigurations, malware detection, remediation management | 24/7 vulnerabilities discovery, Triage, Reporting, security misconfigurations, malware detection, remediation management | ||
Cloud | - | Continuous real-time protection and agentless scanning of the multi-cloud environment against active exploitation, malware, and unknown threats. | ||
API | - | Assessing and remediating risks to eliminate coding errors that can lead to data loss and business disruption | ||
No. of Assets | 50 | 100+ | ||
No. of Assessment Tools | 2 Automated scanners, 5+ manual scanners for web | 2 Automated scanners, 5+ manual scanners for web, 1 cloud scanner, 1 api scanner | ||
Executive Report | Yes | Yes | ||
Technical Report | Yes | Yes | ||
SOC Analyst Support | 12/7 | 24/7 | ||
2. Compliance Audit | ||||
Industry Compliance | PCI DSS, HIPAA, ISO 27001, SOC, | PCI DSS, HIPAA, ISO 27001, SOC, NISA and others | ||
Executive Report | Yes | Yes | ||
Auditor Report | - | Yes | ||
3. Application Security | ||||
SAST | Scanning as you write the code, 100 languages and framework scans, real-time vulnerabilities scanning | Scanning as you write the code, 100 languages and framework scans, real-time vulnerabilities scanning | ||
DAST | Finding and fixing runtime vulnerabilities in web and API | Finding and fixing runtime vulnerabilities in web and API | ||
Container | - | Finding and fixing vulnerabilities in development process and speeding developer-led remediation, scanning IaC files such as Terraform, CloudFormation, Dockerfiles, Kubernetes manifests, Helm charts, AWS cloud formation, and Azure ARM templates | ||
Executive Report | Yes | Yes | ||
Technical Report | - | Yes | ||
SOC Analyst Support | - | 24/7 | ||
4. DarkWeb Monitoring | ||||
Deep & Dark Web Scanning | Scanning against IPs, domains, executives, emails, mailServers, API | Scanning against IPs, domains, executives, emails, mailServers, API | ||
Threat Analysis | Chat rooms, marketplaces monitoring (against compromised/breached data) | Chat rooms, marketplaces monitoring (against compromised/breached data) | ||
Compromised Endpoints Detection | - | Yes | ||
Executive Report | Yes | Yes | ||
Technical Report | - | Yes | ||
SOC Analyst Support | - | 24/7 | ||
5. Social Engineering Assessment | ||||
Phish Test | Mock phish attack campaign against users & staff | Mock phish attack campaign against users & staff | ||
Tracking | Phishing reply tracking, tracking links clicked by users | Phishing reply tracking, tracking links clicked by users | ||
Domain Doppelganger Testing | Discovering dangerous look-alike domains | Discovering dangerous look-alike domains | ||
Mailserver Security Assessment | - | Testing mailserver against emails with attachments that contain password-protected, macro-zipped, and .exe files | ||
Domain Spoof Testing | - | Yes | ||
Network Test Against Ransomware | - | Yes | ||
Awareness Training Program | - | Web-based custom program for staff and users | ||
Executive Report | Yes | Yes | ||
Technical Report | Yes | Yes | ||
SOC Analyst Support | 12/7 | 24/7 |
Service Options
Customize PenTest PRO According To Your Business Challenges.
Download a PenTest PRO Proposal to learn more about five services’ key features, service duration, and other details. Fill out the form and get a copy of the proposal in your inbox.