Select your cookie preferences

We use essential cookies and similar tools that are necessary to provide our site and services. We use performance cookies to collect anonymous statistics, so we can understand how customers use our site and make improvements. Essential cookies cannot be deactivated, but you can choose “Customize” or “Decline” to decline performance cookies.

If you agree, AWS and approved third parties will also use cookies to provide useful site features, remember your preferences, and display relevant content, including relevant advertising. To accept or decline all non-essential cookies, choose “Accept” or “Decline.” To make more detailed choices, choose “Customize.”

    Listing Thumbnail

    Fortis Penetration Testing Internal External Pen Test

     Info
    Internal & External Pen Tests simulate a realistic, exhaustive attack against an organization’s Internet-facing hosts as well as internal environment. Are you secure?
    Listing Thumbnail

    Fortis Penetration Testing Internal External Pen Test

     Info

    Overview

    Evaluate the resilience of your AWS environment by assessing its effectiveness against diverse cyberattacks. This comprehensive analysis delves into exploiting low-risk vulnerabilities to gauge their potential impact on your AWS critical infrastructure. Uncover hidden weaknesses and coverage gaps that may escape detection in standard security assessments and vulnerability scans. Measure the real-world impact of successful attacks on users, operations, and business functions, providing insights to quantify the necessity for additional security investments. This process aids in refining your security strategy, enhancing compliance policies, and fine-tuning guidelines for a more mature and robust security. A combined internal and external engagement where Sentinel pen testers attack an organization’s infrastructure from all fronts. Purpose - Simulates attack against the entire network infrastructure, both internal and external • Goal - Obtain credentials, exploit network hosts, gain access to services and sensitive data • Can include any add-on products from either the Internal or External Pen Test product offerings • The customer will work with Sentinel’s pen testers to highlight any areas of concern or interest • This engagement is designed to be extremely stealthy and highlights common attack vectors that are used by real-world attackers when attempting to gain access to an organization, move throughout the environment, escalate privileges, and access sensitive data • Dedicated Project Manager • Fully detailed deliverable report with remediation recommendations at the conclusion of the project • Detailed WebEx presentation of the full report by the penetration tester at the conclusion of the project • All tests are done 100% remotely with no on-premise visits required

    Highlights

    • Pen-Test

    Details

    Categories

    Delivery method

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Support

    Vendor support

    https://www.sentinel.com 

    1.800.769.4343 (main)

    1.844.297.4853 (Incident Response Emergency)

    infoSENter@sentinel.com