LE-Global Penetration Testing

Nowadays, many organizations claim to be able to perform IT penetration testing, but IT penetration testing from a Professional perspective is very different, here’s how LE Global do it:

1. )We are using some of the best commercial and open source tools in carry out the vulnerabilities finding process.

2.) We respect your Confidentiality, Integrity and Availability of your information systems. We will never actually “penetrate” into your systems without first getting the consent from your first.

e.g. If we found a defacement vulnerability on your web server, we will immediately inform you first; and seek your advise on it; if exploitation is totally required, then only we will proceed with exploitation; otherwise, we will just document the findings and later assist you in rectifying the vulnerability.

And most importantly, we do not rely our penetration testing on automated tools; backed by experience IT security experts who come from different fields such as Programming, Server Administration and Networking, we will still manually verify all the findings we have obtained from the automated tools, classify the findings and finally produce a meaningful penetration testing report that is customized to your business environment.