Method of evaluating computer and network security by simulating an attack
Name | Description | Industry | Official Website | Location |
---|---|---|---|---|
Tetra Tech is a Pasadena, California-based engineering and design consultancy firm working towards greater efficiency and green buildings. | ||||
Bugcrowd is an enterprise cloud computing and computer security crowdsourcing company that offers a platform for security testing, web, mobile, source code, and client-side applications. | ||||
Qinetiq is a multinational defense and security technology company that was founded in 2001 and situated in Cardigan, the United Kingdom. | ||||
Motorola Solutions is an american data communications and telecommunications equipment provider founded in 1943 by Paul Galvin. | ||||
Keysight is a Santa Rosa, California-based electronic design, test automation, and equipment measurement solutions provider. | ||||
L3Harris is an aerospace and defense technology company offering solutions for air, land, sea, space, and cyber operations. | ||||
Prevent Breach is a cybersecurity company offering cybersecurity planning services, risk assessments, and penetration testing. | ||||
Hacken provide a range of cybersecurity services including security assessments, blockchain security audits, and secure software development. | ||||
Leidos, formerly known as Science Applications International Corporation (SAIC), is an American defense, aviation, information technology, and biomedical research company headquartered in Reston, Virginia, that provides scientific, engineering, systems integration, and technical services. | ||||
Veracode Dynamic Analysis provides context around how an application responded to an attack and how it was exploited. | ||||
Rapid7 is a Boston-based cybersecurity company providing security data and analytics solutions. | ||||
Appknox is a mobile application security platform that detects and fixes security vulnerabilities using an Automated Security Testing suite. | ||||
A cybersecurity company offering an application security platform for enterprises. | ||||
Verint is a leader in Actionable Intelligence with a focus on customer engagement optimisation, security intelligence, fraud, risk and compliance. | ||||
A cybersecurity company offering cybersecurity and security rating services. | ||||
ScienceSoft is a professional business intelligence services provider founded in 1989. | ||||
CNS Group provides industry leading cyber security though managed security services, penetration testing, consulting and compliance. | ||||
Zeguro is a cybersecurity company developing a platform for small businesses and its cyber risks. | ||||
Pentera, formerly Pcysys, is a Petah Tikva-based cybersecurity company delivering an automated penetration testing platform. | ||||
KBR is a global provider of comprehensive solutions for aerospace and defense, energy and chemicals, intel and data science, and federal and civilian markets based in Houston. | ||||
Synack is a Redwood City, California-based cybersecurity company developing a crowdsourced security platform. | ||||
Clear Thinking is an IT Solutions company specialising in secure & compliant technical services. | ||||
Chess ICT Ltd is a UK based technology provider, founded in 1993 by David Pollock in Alderley Edge. The business has 6 offices across the UK: Abingdon, Alderley Edge, Borehamwood, Bury St Edmunds, Burnley and Glasgow. | ||||
MythX is the premier security analysis service for Ethereum smart contracts. | ||||
Intellias is a software engineering company developing connected devices and systems for the automotive industry. |
Pen testing, also known as penetration testing, is a cybersecurity exercise carried out to find vulnerabilities in a computer system by simulating a cyber attack. This allows the computer system owner to be aware of any vulnerabilities to true cyber attacks.
This is like a bank hiring someone to dress as a burglar and try to break into their building and gain access to the vault. If the ‘burglar’ succeeds and gets into the bank or the vault, the bank will gain valuable information on how they need to tighten their security measures.
There are five main types of pen tests.
Method of evaluating computer and network security by simulating an attack