SlideShare une entreprise Scribd logo
1  sur  16
Penetration Testing Services
Presented by
Martin Voelk
Co-Founder and Director
For Partners
Agenda
1. Cyber Security Background
2. Threats and why customers need Cyber Security?
3. How Partners can expand their portfolio?
4. The Services
- Network Penetration Testing
- Web Application Penetration Testing
- Network Vulnerability Assessment
- Web Application Vulnerability Assessment
- Social Engineering
5. The Operational Process
Cyber Security Background
• IT has changed the way we live and work
• Businesses and individuals rely on IT infrastructures
• Cyber Crime has equally stepped up in the game
Most businesses deploy the latest modern communication
infrastructures such as clouds, tablets, smartphones, wireless etc.
However whilst up to date on technology – they are typically not
up to speed on Cyber Security.
Why Cyber Security?
• Every day, Hackers attack both personal corporate systems
Main Motives are either personal, financial or political:
Theft
customer details, credit card information, confidential
information etc.
Destruction (aka Denial of Service)
competitors, rogue states, hackers in general
Why Cyber Security?
• Why would customers would invest in a Security Audit?
A. They realize the threat is real and they want to be protected
before they fall victim to an attack (pro-active customers)
B. They are forced by industry and/or government regulations to
secure their infrastructure accordingly (i.e. PCI Compliance)
C. Customers who have already fallen victim and want to be
prepared for future attacks (re-active customers)
Partners – Why Cyber 51?
• Cyber 51 follows a partner strategy
• Partners can resell the full Cyber 51 portfolio to their clients
• Everything can be white labeled
(ie. Cyber 51 is working in the background as partner Ops)
• Partner may also choose to mention a partnership between
Cyber 51 and the partner. This is often beneficial when the
client requires Cyber Security certifications which the partner
may not have
• Mutual NDAs, contractual agreements and processes ensure
protection for all parties and smooth operations.
Partners – Why Cyber 51?
Unique Selling Proposition
• Company dedicated to Cyber Security only
• Remote and On-Site capabilities across all continents
• Services in 3 languages (English, German and Spanish)
• Very competitive pricing
• Fully white labeled services
• Highly certified and 10 years+ experienced Consultants
• Free Pre-Sales Support (white labeled) on behalf of Partner
• Free Pre-Sales and Educational Webinars for Partners
• Fix service capabilities (Servers, Networking, Design)
Partners
• Most partners are IT services companies
• A Penetration test can often serve as a door opener to
upselling opportunities (ie. fixing the loopholes, configuring
network and server equipment correctly etc.)
• Flexible pricing models to ensure win-win for all parties
• Partners can receive marketing materials and texts to
implement in Newsletters, Websites etc.
Services
1. Network Penetration Test
2. Web Application Penetration Test
3. Network Vulnerability Assessment
4. Web Application Vulnerability Assessment
5. Social Engineering
Full Service Portfolio at:
http://www.cyber-51.com/it-security-services
Network Penetration Test
Network Penetration Test
Penetration testing or sometimes known as “ethical hacking” is a
security testing service that focuses on locating flaws in your
networks, infrastructure and overall architecture. Tests involve
active exploitation of vulnerabilities.
Steps:
- Written consent of customer is obtained
- Penetration Test is being performed during agreed time frames
- Report is being created
- Debrief with customer and report delivery is scheduled
- Customer can fix the vulnerabilities (upsell opportunity)
Web Application Penetration Test
Web Application Penetration Test
More than 70% of all attacks are aimed at the Application layer.
This service examines your web applications from coding and
implementation flaws through to other issues like SQL injection
and cross-site-scripting, involving active exploitation of
vulnerabilities.
Steps:
- Written consent of customer is obtained
- Penetration Test is being performed during agreed time frames
- Report is being created
- Debrief with customer and report delivery is scheduled
- Customer can fix the vulnerabilities (upsell opportunity)
Vulnerability Assessments
Network / Web Application Vulnerability Assessment
This service is similar to a Penetration Test, however no active
exploitation is being performed. Customer is made aware of
vulnerabilities but they are not being exploited (hacked) in order
to gain access. Service takes less time and is more on budget for
small clients.
Steps:
- Written consent of customer is obtained
- Vulnerability Test is being performed during agreed time frames
- Report is being created
- Debrief with customer and report delivery is scheduled
- Customer can fix the vulnerabilities (upsell opportunity)
Social Engineering
Social Engineering
Social engineering security is a term that describes the non-
technical intrusion into your business environment that relies on
human interaction, often involving tricking people in order to
break normal security policies.
Steps:
- Written consent of customer is obtained
- Social Engineering is being performed during agreed dates
- Report is being created
- Debrief with customer and report delivery is scheduled
- Customer can fix the vulnerabilities (upsell opportunity)
White Label Cloud Scanning Portal
Cyber 360 Security Cloud Scanning Portal
• No software or agent required
• Scanning whole infrastructures in minutes
• Comprehensive Reporting
• PC/Laptop, MAC and Mobile Scanning
• PCI Scanning & PAN (Credit Card) Scanning
• Cloud Based Customer Portal
• More info: www.cyber360security.com
Benefits
The solution:
Penetration Tests and Network Security
Audits.
Cyber 51 will, with the legal permission
of the network owner, attack customer
systems in the same way as a Hacker.
By doing so, we are able to expose
security holes in the systems.
The benefit:
The customer is made aware of any
Security holes that exist which could
be exploited by a hacker with
malicious intent to gain unauthorized
access to the customer network.
In addition, Cyber 51 will prepare an
action plan and, if the customer
wishes, to implement closure of these
holes.
Thank you for your time!
Phone (US): +1 (888) 808 7843
info@cyber51.com
www.cyber51.com

Contenu connexe

Dernier

Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Dernier (20)

Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

En vedette

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

En vedette (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Cyber 51 Partnership Program Presentation | Penetration Testing | Cyber Security

  • 1. Penetration Testing Services Presented by Martin Voelk Co-Founder and Director For Partners
  • 2. Agenda 1. Cyber Security Background 2. Threats and why customers need Cyber Security? 3. How Partners can expand their portfolio? 4. The Services - Network Penetration Testing - Web Application Penetration Testing - Network Vulnerability Assessment - Web Application Vulnerability Assessment - Social Engineering 5. The Operational Process
  • 3. Cyber Security Background • IT has changed the way we live and work • Businesses and individuals rely on IT infrastructures • Cyber Crime has equally stepped up in the game Most businesses deploy the latest modern communication infrastructures such as clouds, tablets, smartphones, wireless etc. However whilst up to date on technology – they are typically not up to speed on Cyber Security.
  • 4. Why Cyber Security? • Every day, Hackers attack both personal corporate systems Main Motives are either personal, financial or political: Theft customer details, credit card information, confidential information etc. Destruction (aka Denial of Service) competitors, rogue states, hackers in general
  • 5. Why Cyber Security? • Why would customers would invest in a Security Audit? A. They realize the threat is real and they want to be protected before they fall victim to an attack (pro-active customers) B. They are forced by industry and/or government regulations to secure their infrastructure accordingly (i.e. PCI Compliance) C. Customers who have already fallen victim and want to be prepared for future attacks (re-active customers)
  • 6. Partners – Why Cyber 51? • Cyber 51 follows a partner strategy • Partners can resell the full Cyber 51 portfolio to their clients • Everything can be white labeled (ie. Cyber 51 is working in the background as partner Ops) • Partner may also choose to mention a partnership between Cyber 51 and the partner. This is often beneficial when the client requires Cyber Security certifications which the partner may not have • Mutual NDAs, contractual agreements and processes ensure protection for all parties and smooth operations.
  • 7. Partners – Why Cyber 51? Unique Selling Proposition • Company dedicated to Cyber Security only • Remote and On-Site capabilities across all continents • Services in 3 languages (English, German and Spanish) • Very competitive pricing • Fully white labeled services • Highly certified and 10 years+ experienced Consultants • Free Pre-Sales Support (white labeled) on behalf of Partner • Free Pre-Sales and Educational Webinars for Partners • Fix service capabilities (Servers, Networking, Design)
  • 8. Partners • Most partners are IT services companies • A Penetration test can often serve as a door opener to upselling opportunities (ie. fixing the loopholes, configuring network and server equipment correctly etc.) • Flexible pricing models to ensure win-win for all parties • Partners can receive marketing materials and texts to implement in Newsletters, Websites etc.
  • 9. Services 1. Network Penetration Test 2. Web Application Penetration Test 3. Network Vulnerability Assessment 4. Web Application Vulnerability Assessment 5. Social Engineering Full Service Portfolio at: http://www.cyber-51.com/it-security-services
  • 10. Network Penetration Test Network Penetration Test Penetration testing or sometimes known as “ethical hacking” is a security testing service that focuses on locating flaws in your networks, infrastructure and overall architecture. Tests involve active exploitation of vulnerabilities. Steps: - Written consent of customer is obtained - Penetration Test is being performed during agreed time frames - Report is being created - Debrief with customer and report delivery is scheduled - Customer can fix the vulnerabilities (upsell opportunity)
  • 11. Web Application Penetration Test Web Application Penetration Test More than 70% of all attacks are aimed at the Application layer. This service examines your web applications from coding and implementation flaws through to other issues like SQL injection and cross-site-scripting, involving active exploitation of vulnerabilities. Steps: - Written consent of customer is obtained - Penetration Test is being performed during agreed time frames - Report is being created - Debrief with customer and report delivery is scheduled - Customer can fix the vulnerabilities (upsell opportunity)
  • 12. Vulnerability Assessments Network / Web Application Vulnerability Assessment This service is similar to a Penetration Test, however no active exploitation is being performed. Customer is made aware of vulnerabilities but they are not being exploited (hacked) in order to gain access. Service takes less time and is more on budget for small clients. Steps: - Written consent of customer is obtained - Vulnerability Test is being performed during agreed time frames - Report is being created - Debrief with customer and report delivery is scheduled - Customer can fix the vulnerabilities (upsell opportunity)
  • 13. Social Engineering Social Engineering Social engineering security is a term that describes the non- technical intrusion into your business environment that relies on human interaction, often involving tricking people in order to break normal security policies. Steps: - Written consent of customer is obtained - Social Engineering is being performed during agreed dates - Report is being created - Debrief with customer and report delivery is scheduled - Customer can fix the vulnerabilities (upsell opportunity)
  • 14. White Label Cloud Scanning Portal Cyber 360 Security Cloud Scanning Portal • No software or agent required • Scanning whole infrastructures in minutes • Comprehensive Reporting • PC/Laptop, MAC and Mobile Scanning • PCI Scanning & PAN (Credit Card) Scanning • Cloud Based Customer Portal • More info: www.cyber360security.com
  • 15. Benefits The solution: Penetration Tests and Network Security Audits. Cyber 51 will, with the legal permission of the network owner, attack customer systems in the same way as a Hacker. By doing so, we are able to expose security holes in the systems. The benefit: The customer is made aware of any Security holes that exist which could be exploited by a hacker with malicious intent to gain unauthorized access to the customer network. In addition, Cyber 51 will prepare an action plan and, if the customer wishes, to implement closure of these holes.
  • 16. Thank you for your time! Phone (US): +1 (888) 808 7843 info@cyber51.com www.cyber51.com