Penetration Testing Services

Thorough Reports. Actionable Recommendations.

Certified penetration testing services

Penetration testing is a proactive approach to discovering exploitable vulnerabilities in your computer systems, network, and web applications. Our manual testing process goes beyond automated scanning and into complex security exploitation. Gain a thorough understanding of these vulnerabilities and begin to remediate the issues before an attacker is able to interrupt your business operations.

  • Secure your data and systems
  • Prevent business interruption
  • Protect your brand image

Ready to learn more?

Or, call (515) 965-3756 ext. 3.

Our Pen Testing Services

Pratum's solutions help provide insight into an attacker's mind. We prepare organizations to defend against cyber attacks by educating through ethical security exploitation. Our ethical hackers perform penetration testing from our labs in Des Moines, IA, Kansas City, MO, and Dallas, TX. When appropriate, testing can also be performed on-site, at client locations.

Network and Infrastructure Penetration Testing Services

Infrastructure penetration testing identifies security weaknesses in your network, as well as the devices within the network. Our testers search to identify flaws such as out of date software, missing patches, improper security configurations, weak communication algorithms, command injection, etc. Infrastructure penetration tests often include the testing of firewalls, switches, virtual and physical servers, and workstations.

Web Application Penetration Testing Services

Web applications often process and/or store sensitive information including credit cards, personal identifiable information (PII), and proprietary data. Applications are an integral business function for many organization, but with that functionality comes risk. Pratum's penetration testers seek to obtain unauthorized access into web applications and gather sensitive information to provide visibility into the risks associated with application vulnerabilities.

Penetration Testing Methodology

Penetration Testing Methodology Scoping and Pre-Engagement Define success criteria Reconnaissance Information gathering and discovery, Device and OS enumeration, Port scanning and Network sniffing. Discover and Vulnerability Assessment Vulnerability detection, Authentication testing, Data validation and Configuration management. Exploitation Vulnerability verification and False positives and false negatives elimination Analysis & Reporting:  Analyze and consolidate findings to report vulnerabilities.

Wireless Penetration Testing Services

Your wireless network may be susceptible to exterior signal bleeding. Pratum's wireless pen testing services focus on the discovery of wireless access points, attempting to enumerate weaknesses in the wireless infrastructure. After gaining access to the wireless network, Pratum’s penetration testers attempt to exploit weaknesses in your network to gain access to privileged areas and demonstrate the potential impact of a wireless network breach.

Social Engineering Testing Services

Social engineering is a true assessment of an organization’s security training and awareness practices. By performing social engineering assessments of an organization’s facilities and employees, Pratum is able to establish the baseline security posture and make recommendations for modifying and developing stronger policies and procedures.

Want to learn more about penetration testing? We have prepared several penetration testing blog articles and infographics just for you.

Our certifications

  • GIAC Penetration Tester (GPEN)
  • GIAC Web Application Penetration Tester (GWAPT)
  • Certified Ethical Hacker (C|EH)
SOC 2 Certification

Penetration testing deliverables

Our testers perform assessments, interpret the results, and provide reports for your organization. Deliverables for a penetration test include:

Executive summary report

A high-level overview of your pen test report; highlighting critical vulnerabilities

Full technical report

An in-depth look into how your information security controls performed during testing

An action plan for remediation

An actionable guide designed to help secure your organization's vulnerabilities

Validation of remediation efforts (external pen tests only)

With external penetration tests, Pratum provides validation of remediation efforts within a designated timeframe from the delivery of your report. These validations ensure that your organization has performed the necessary tasks to protect and secure your confidential data.

Penetration Testing Information

Learn how our penetration testing services could strengthen your business.

Call (515) 965-3756 ext. 3, or fill out this form.