Suite A 4401 Quebe Ave North, New Hope, MN 55428
Phone 888-847-4783, 763-533-0475 fax 763-445-2177
Email: idps2012@gmail.com

About Pen Testing

Why conduct a Penetration Test?
Penetration Test vs. Vulnerability Assessment
Testing Approaches
Types of Penetration Tests
What should be tested?
What do you get?
What ensures success?
Choosing a PenTester

Standard compliance


Choosing a PenTester

Having determined the objectives from the assessment, and the scope required, the following should be asked of a potential supplier to determine whether they are appropriate.

1. Are they security specialists first and foremost, or is the security practice a secondary concern?

2. Does the organization's methodology follow and exceed those such as OSSTMM, and OWASP?

3. Do they offer a comprehensive suite of services, tailored to the specific requirements of their clients?

4. Are they able to distinguish and articulate between infrastructure and application testing?

5. Are their staff experienced security professionals, holding recognized certifications such as CISSP?

6. Do the deliverable s, such as the final report, present the results in an informed manner, with concise and practical information for technical and non-technical parties?


For a penetration test, please submit:

Business Name:
Contact Information:
Email Address:
URL or IP address:
Network Penetration Test for

Other members of our business group:
Cloud-Security.us | USRenewableConsultant.com | Strategic-Business.info | US-scada.com

COPYRIGHT (C) 2000 - 2011 Info-Sec-Pro.com ALL RIGHTS RESERVED