Select your cookie preferences

We use essential cookies and similar tools that are necessary to provide our site and services. We use performance cookies to collect anonymous statistics, so we can understand how customers use our site and make improvements. Essential cookies cannot be deactivated, but you can choose “Customize” or “Decline” to decline performance cookies.

If you agree, AWS and approved third parties will also use cookies to provide useful site features, remember your preferences, and display relevant content, including relevant advertising. To accept or decline all non-essential cookies, choose “Accept” or “Decline.” To make more detailed choices, choose “Customize.”

    Listing Thumbnail

    Threat and Attack Simulation

     Info
    Penetration testing services that remove the hypothetical from your security conversation. Rather than the common phrases like an attacker can do this or this might be vulnerable which are common phrases to most assessments, our penetration testing shows real world results.
    Listing Thumbnail

    Threat and Attack Simulation

     Info

    Overview

    Our highly-certified team uses controlled exploitation, detailed evidence and concise reporting to give meaningful insights to prioritize tactical remediation and plan strategic investments. We provide tangible evidence to help you achieve these common objectives in your AWS environment.

    Highlights

    • Penetration Testing - Internal, External and Cloud. Performed from either the perspective of an attacker on the internet attempting to find weak areas of the organization's perimeter, or simulating an attacker on the internal network and actively exploiting vulnerabilities to demonstrate the impact of unpatched vulnerabilities and secure configuration deficiencies. Our internal, external and cloud pentest services provide a repeatable demonstration of the impact of any exploitable findings.
    • Onsite and Remote Social Engineering - Put your people to the test to gauge the effectiveness of security awareness training and technical defenses with our phishing, phone and on-site pre-texting exercises that are tailored to your specific requirements.
    • Red & Purple Teaming - Our red teaming service combines the most nefarious tactics, techniques, and procedures from our open-source intelligence gathering, social engineering and penetration testing offerings into a multi-pronged attack that closely mimics a sophisticated adversarial assault. Purple team exercises transform tabletop exercises into live-fire scenarios driven by Red and Blue teams to identify gaps while providing best practice recommendations.

    Details

    Categories

    Delivery method

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Support

    Vendor support

    Project Management and support provided based on the terms of the scope of the agreement, per application or service offiering.

    aws.appsec@guidepointsecurity.com