64MM

Get_Event_Log
  • Home
  • Vulnerability Assessment
  • Penetration Test
  • SQA
  • Government Contracting
  • Blog
  • Resources
  • About
  • More
    • Home
    • Vulnerability Assessment
    • Penetration Test
    • SQA
    • Government Contracting
    • Blog
    • Resources
    • About
Get_Event_Log
  • Home
  • Vulnerability Assessment
  • Penetration Test
  • SQA
  • Government Contracting
  • Blog
  • Resources
  • About

Penetration Testing

Penetration Testing with Get Event Log LLC

Let us launch a controlled cyber-attack on your network, applications, processes or environments. Security is a very important component to any organization that is connected to the Internet. Please feel free to send us an email to begin a conversation about what types of tests your organization could use.


We adhere to the NIST Cybersecurity Framework, and ISO/IEC 27002.


If you would like to fill out a scope document click here to download.

email us

Testing Approaches

• Black Box Penetration Testing (click for more details): In this approach, the tester assesses the target system, network or process without the knowledge of its details. They just have a very high level of inputs like URL or company name using which they penetrate the target environment. 


• White Box Penetration Testing (click for more details): In this approach, the tester is equipped with complete details about the target environment – Systems, network, OS, IP address, source code, schema, etc. It examines the code and finds out design & development errors. It is a simulation of an internal security attack.


 • Grey Box Penetration Testing (click for more details): In this approach, the tester has limited details about the target environment. It is a simulation of an insider threat or application testing.

Web Application Penetration Test

Web applications (click for more details). How secure are your web applications and web presence? Let us validate this for you with a Web Application Penetration Test, either with black box or gray box methodologies. Web applications are the most frequently attacked items on the Internet and are often the most insecure.

Social Engineering

We can implement social engineering (click for more details) in the context of information security, by using psychological manipulation on your organization by performing certain actions or divulging confidential information.     


Remote Tests are used to trick an employee into compromising confidential data using electronic means. The tester could conduct such an attack via a phishing email campaign.    


Physical Tests require direct contact with the employee to retrieve sensitive information. It may also involve tactics like Dumpster Diving, Imitation, Intimidation or trying to convince the subject via telephone calls. 

Wireless

Wireless penetration testing (click for more details) encompasses penetration testing against your wireless network and vulnerability assessments against access points if we are able to gain access to your wireless network.

Reporting

We document every step of the testing. The documentation will contain an introduction, scope, executive summary, test methodology, vulnerability description, recommendations, and conclusions, listing of tests completed, findings, methodology, mitigation suggestions and threat rankings.

PCI Compliance Testing (COMING SOON)

The Payment Card Industry Data Security Standard (PCI DSS) (click for more details) is a set of  security standards designed to ensure the secure handling of payment  card information by merchants and service providers.


Organizations that handle payment card information must comply with the  PCI DSS in order to accept payment card transactions. Compliance with  the PCI DSS involves a combination of technical and operational  controls, and may involve the implementation of security measures such  as firewalls, encryption, and vulnerability management.   

Contact Us

Get Event Log LLC

chris@geteventlog.com +1 904 599-0195

Hours

Today

Closed

 Feel free to give us a call or send an email 24 hours a day. We'll return your call or mail ASAP. 

Copyright © 2023 Get Event Log LLC - All Rights Reserved.

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be anonymously aggregated for analysis.

DeclineAccept