Penetration Test

Service Profile

Most institutions scan their perimeter and internal networks for vulnerabilities to see what may be exploitable from the outside. However, today's cyber-threats are multi-faceted with determined attackers that utilize all means at their disposal, including Social Engineering methods (targeted phishing emails and Pretext Calling) and even physical penetration attempts. Most incidents begin with phishing emails that exploit internal systems when clicked, and the breach spreads from there. How would your network defenses and security team respond to such an attack?

10-D Security's Penetration Test simulates a "real world" Cyber-Attack on your institution, challenging your team’s monitoring and alerting controls as well as incident response.

The test is performed as a “Black-Box Assessment.” Meaning we will have no advance knowledge of your infrastructure at the start. Our test mirrors how actual attacks occur, but without the stress or liability. 10-D Security’s Red Team will employ cutting edge techniques and strategies used by today’s bad guys to detect and evaluate your security controls.

This test does not replace a traditional External Vulnerability Assessment or Social Engineering Assessment, but complements them by enabling institutions to assess how their layered security controls hold up to a complex and persistent attack.

The Difference

The Client

This assessment is appropriate for organizations when the following apply:

The Scope

The scope of our Penetration Test is straight forward. All client assets may be targeted for weak links and may include any of the following:

Please contact us for a quote or additional information at or 877-204-5769.