OUR PENTEST APPROCHES
We work on 3 different types of approaches and generally suggest that our customers start with a BLACK BOX mode followed by a GREY BOX and finally end with a WHITE BOX.
OUR METHODOLOGYPTES[ Penetration Testing Execution Standard ]
The Penetration Testing Execution Standard is a standard created to provide companies and security teams with a common framework and a framework (scope) for conducting a pentest.
Regarding its content here are the 7 phases below:
We generally offer a package to our customers, however it is also possible to carry out a pentest over a clearly defined period of time.
OWNER / PENTESTER
Overflowing with ideas and creativity, this enthusiast of technology, it and cyber security is always attentive to the needs of his customers and knows how to adapt to the particularity of his field!
DPO (DATA PROTECION OFFICER)
REEL TIME ATTACKS
Below is a real-time map of the various computer threats.