You are here

Our Experience

The strength of our vulnerability assessment and penetration testing is a function of the capability of our people, the power of the industry leading tools we employ, and the effectiveness of our proven methodology. Wolf’s advanced security practitioners team undergoes advanced training throughout the year to ensure our penetration testers are using the most advanced tools and manual techniques, and remain current on industry leading certifications. This allows us to gain clear visibility into our clients’ vulnerabilities and give pointed, actionable remediation strategies to mitigate the latest security threats.

Our Approach

Wolf performs both credentialed vulnerability assessments and non-credentialed penetration testing. We work with every client to come up with the proper approach to meet both their internal requirements and contractual or regulatory obligations. Our vulnerability assessments help our clients validate that their patch management program is operating and effective by validating that they are up to date on all Microsoft and third-party software patches.

Penetration testing is a live test of the effectiveness of security defenses through mimicking the actions of real-life attackers. Our penetration testing methodology includes the following four steps:

  1. Discovery
  2. Enumeration
  3. Vulnerability mapping
  4. Exploitation

These steps ensure a thorough execution of a penetration test. Our penetration testing approach is built upon a framework that identifies weaknesses and vulnerabilities using a combination of professional-grade and open source security applications and utilities. Our assessments are designed to validate your existing asset and patch management programs, identify your organization’s security posture against real-world attack vectors, and secure and prepare your organization against the latest external and internal threats.

Vulnerability Assessment/Penetration Testing Services Include:

  • Credentialed Vulnerability Scans to Validate Patch Management Program
  • External Vulnerability Assessments and Penetration Testing
  • Internal Vulnerability Assessments and Penetration Testing
  • Wireless Penetration Testing
  • Open Web Application Security Project (OWASP) Application Penetration Testing
  • Blue Team/Incident Response Plan Testing
  • Review of Current Vulnerability Management Program