Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help
ProServ

Overview

Available to hackers 24x7 and brim-full of data, web applications present a tempting target for hackers. A large proportion of breaches occur due to vulnerabilities found in Web Applications. Claranet offers a professional, collaborative approach to Web Application Testing to support your organisation in strengthening its security posture.

Claranet Web Application Security Testing is based on manual exploitation of vulnerabilities, giving you the business risk assessment that only a professional tester can deliver. We integrate this with advanced automated technologies.

Claranet provides visibility of risks. This gives you valuable insight into unauthorised access past authentication controls, privilege escalation, the introduction of malicious code, manipulation of the application’s function, defacing websites, disruption and gaining access to your hosting infrastructure. All assessments are followed by a comprehensive report, with non-technical and technical descriptions, alongside recommendations for remediation.

Claranet Cyber Security uses a combination of both manual and automated analysis for web application assessments. The manual analysis is in tandem with a testing guide provided by OWASP. The Claranet methodology for Web Application Testing follows our robust approach to delivery supplemented with Application Discovery & Analysis, Vulnerability Assessment & Analysis, Automated Vulnerability Assessments, Manual Vulnerability Assessments and Penetration Testing (exploitation and post-exploitation).

Sold by Claranet
Categories
Fulfillment method Professional Services

Pricing Information

This service is priced based on the scope of your request. Please contact seller for pricing details.

Support

Claranet Cyber Security provides support around all aspects of security testing it provides throughout the process - in the form of pre-test scoping assistance (helping the organisation to select appropriate attack perspectives), guidance regarding suitable levels of access for the attack simulations as well as training and advice following completion of the tests and how to interpret and benchmark the results.

Support is priced based upon the technical resource it requires and is calculated based upon the day rate for penetration testing.

All engagements are assigned a technical resource (in this case a senior penetration tester) and an account manager (for project management, commercial negotiations and resource scheduling).