There are a variety of technical solutions on the market allowing remote workers to access corporate resources from any location. These include site-to-site and client-based virtual private networks (VPNs), remote email access portals, and document shares to name just a few. They allow business as usual activities to continue when employees cannot work from the office. However, with so many different remote working solutions and possible configurations, there is the risk of a software or configuration issue introducing a vulnerability that could be exploited by a remote attacker.
Pentest People have built a Remote Working Security Assessment service that is tailored around the unique needs of each client so you can be assured that you are not opening up your corporate network to further risks.
Get a Quote
Our experts will listen to you and your needs to develop a tailored testing strategy. From here our consultants will use a wide variety of penetration testing tools and resources to gather information on your organisation.
Now the test is complete our consultants will fill out a detailed report of their findings, broken down by category and type, adding any remediation advice to the exploits and vulnerabilities they discovered. This data will be accessible via SecurePortal and follow up calls will be made to walkthrough the test and the steps required to remove the risks found.
SecurePortal provides clients with a new way to monitor and analyse the data you receive in your penetration tests. Rather than a lengthy physical report you gain a range of simple features that highlight your test findings and vulnerabilities.
Easily access remediation advice from our team of consultants on discovered vulnerabilities and assign them to your team for fast and efficient resolution. Receive overview and trend data of all of the current security issues you face in your organisatio and so much more./
Gain useful insight into the security of your remote working solution, ensuring that your corporate data is not exposed by a configuration vulnerability.
Meet the requirements of many compliance standards by performing a security assessment of your remote access solution
Reduce the risk of sensitive data exposure by hardening the security of a very common remote attack vector
Identify software or configuration issues affecting your remote working solution that could be exploited by an attacker
Digitalise Your Testing Process
Until now, the traditional deliverable from a Penetration Testing engagement has been a lengthy 100+ page PDF report. Pentest People have developed a solution to this issue where you interact with your vulnerabilities within the SecurePortal.
Assign your remediation steps via SecurePortal and monitor their progress. Saving you time and resources.
Assign your remediation steps via SecurePortal and monitor their progress. Saving you time and resources.
If an attacker identifies an exploitable vulnerability in your remote working solution, they may be able to access corporate data such as documents and emails.
If your solution provides remote access to the office local network, then the attacker could gain a foothold from which to attack internal servers, workstations, and infrastructure devices.
As part of our Remote Working Security assessment service, Pentest People will use industry-leading techniques to assess the security of your remote working solution following a defence in depth approach, identifying the available public facing attack surface, authentication control weaknesses, segmentation issues, and any configuration vulnerabilities that could allow a user to escalate privileges.
The results of the remote working security are uploaded to your SecurePortal account, as part of the Pentest People’s Pentesting-as-a-Service (PTaaS) offering.
Experienced Consultant Team
Penetration testing is a key component of any effective cybersecurity strategy, and it requires well-trained professionals to execute. Our consultant team needs are highly trained in order to test your business for vulnerabilities and identify potential threats before they cause harm. Our team have a deep understanding of the systems and protocols involved in protecting against hackers, malware, and data breaches.
Need More Info on Our Infrastructure Testing?
The results of the assessment are uploaded to your SecurePortal account, with individual issues ranked in order of severity. The results will also contain a management summary with totals, key points, and detailed consultants comments, ensuring that vulnerabilities are presented realistically and in the context of your environment.
Yes, Pentest People can perform testing of third-party solutions, providing that permission to perform testing has been confirmed. Testing third-party solutions are especially important, as you may not have full visibility of how the service has been configured and secured.
Pentest People can assess the security of any remote working solution, be it a client-based VPN connection with two-factor authentication, or a series of Web-based login portals for accessing emails and documents.
Pentest People's consultants will discuss your current remote working solution in detail, and perform active testing to identify any vulnerabilities that could be exploited by an attacker. Results are uploaded to your SecurePortal account, allowing you to priorities and plan remediation efforts to harden your solution.