The Vulnerability and Threat Management offer provides an independent baseline and validation of your organization's security posture. AT&T Consulting offers a comprehensive and world-class suite of vulnerability assessment and penetration testing services. We can simulate real-world attacks to identify vulnerabilities in the network, evaluate risks and develop remediation plans that are tailored to unique business requirements and security needs.
New and rapidly deployed technologies, changing workforces and profit-driven malware are all affecting the way organizations must evaluate the effectiveness of existing security controls. While vulnerability scanning products and services have matured to become the cornerstones of enterprise security posture assessments, the skill set of attackers continues to outpace such automated tools. The AT&T Consulting Vulnerability Assessment service provides you with an in-depth technical review of your current security posture. When configured appropriately, automated scanners can provide valuable information. However, the output from these applications is not the end deliverable from an AT&T Consulting Vulnerability Assessment. We provide a thorough analysis of vetted data along with prioritized remediation recommendations customized to your needs and requirements.
Key areas of assessment include:
- External Vulnerability Assessment
- Internal Vulnerability Assessment
- Remote Access Assessment
- Wireless Vulnerability Assessment
- Physical Security Assessment
- Social Engineering Assessment
New and rapidly deployed technologies, changing workforces, and additional regulations are increasing the operating complexity within many organizations. Additionally, advances in hacking tools and techniques are forcing client IT staffs to defend against greater and greater threats, while budgetary pressures are often preventing a corresponding increase in available resources. The AT&T Penetration Test service can be tailored to meet your specific needs. Testing can be modeled to replicate various types of attackers, from opportunistic Internet threats to the knowledgeable insider.
Key areas of testing include:
- Incident Response Test
- External Penetration Test
- Internal Penetration Test
- Wireless Penetration Test
- Physical Penetration Test
- War Dialing and PBX Test
- Social Engineering