Network Assessments

OUTCOME AND APPROACH

nVisium performs network assessments that extend beyond the scope of traditional assessments to identify and resolve flaws in your security.

We model our approach on how real-world attackers go about their business by correlating and chaining issues to better assess the strength of your existing security.

Globe

our approach to network assessments

IP Ranges and test blocks

nVisium starts a network assessment by defining the IP ranges and/or blocks to be tested and defining a timeline for conducting the engagement, which includes testing times and notification methods.

ROOT CAUSE ANALYSIS

Our team will perform a thorough review of the network infrastructure, provide root cause analysis and will make recommendations for mitigating each issue.

CUSTOM AND OPEN SOURCE TOOLS

nVisium uses open source tools to perform reconnaissance and information gathering on the in-scope hosts. This information includes frameworks and languages in use, developer information, hosting provider, host information, etc.

Analyze vulnerabilities

nVisium will perform network analysis by mapping and scanning for open ports, assessing network isolation, and fingerprinting services and application versions. After analysis, nVisium will attempt to exploit discovered vulnerabilities when possible.

Network Penetration testing

nVisium's Network Assessments examine the environment from the external view to identify vulnerabilities that may allow access to confidential areas of a network, allow a denial of service to be performed, or obtain sensitive internal information.

Our team will reveal risks to your systems and networks that attackers could find and exploit with a combination of automated and manual techniques. nVisium will perform a review of the network scan and report any ports or services available. Any potential weaknesses will be fully validated to ensure that only actionable, confirmed items are reported to you. The nVisium team will provide detailed information of our findings along with recommendations to help remediation efforts.

ADVERSARIAL AND THREAT ASSESSMENTS

nVisium has the capability to perform custom adversarial and threat assessments beyond the scope of traditional assessments which can include competitive intelligence and opaque testing.

“nVisium’s approach was unique and the team provided actionable findings. They strove to make our application secure and resilient.”

Deltek

Rich Ronston / Director of IT Security at Deltek

“nVisium has a world class application security consulting team that brings unprecedented knowledge, innovation and leadership to help train, advise and assist our development teams.”

CARFAX

Jerry Gamblin / Lead Security Analyst at CARFAX

“nVisium performed a hybrid mobile assessment and then took those findings to build a custom security training course for our developers. The training was valuable, engaging and helpful for the developers to understand the importance of building secure software from the ground up. nVisium's training resulted in more secure code across the organization.”

Tinder

Tony Trummer / Director of Security Engineering at Tinder
Contact us Today
Amazon Web Services .NET Java Android iOS AngularJS nodejs Python Ruby on Rails