top of page

It is important for organizations to identify security holes within their external or internal network before an attacker by conducting a network penetration test. The penetration testing team at The Mako Group can help strengthen your overall security by identifying weaknesses, vulnerabilities, and misconfigurations within your network. The Mako Group moves beyond commoditized tool, techniques and approaches to bring real value to the organization.

 

An external network penetration test focuses on the organization’s public facing network and systems. This simulates an attack by a remote threat actor from anywhere in the world. External network penetration tests commonly focus on identify public facing services, various password attacks, security evasion and identifying misconfigurations that may allow for a foothold into the internal network.

 

An internal network penetration test focuses on the organization’s private network, typically using an assumed breach scenario. In an assumed breach scenario, The Mako Group works with the organization to gain internal network access through legitimate means and uses the provided network access to attempt and perform malicious activities on the network including gaining a foothold into an unauthorized system, horizontally or vertically escalating privileges or gaining access to sensitive information.

What Can We Help You With?

  • Vulnerability Management

    • A vulnerability assessment focuses on identifying current vulnerabilities on a network. This can either be on an external or internal facing network. The goal of the assessment is to help an organization identify currently known security vulnerabilities on a frequent and reoccurring basis to track remediation efforts and provide meaningful metrics for the organization’s cybersecurity health.
       

    • Technical Vulnerability Assessments:

      • Are ideal for organizations looking to achieve compliance or gain an understanding of their current environment

      • Are critical in the early identification of vulnerabilities

      • Can provide a variety of metrics useful for evaluating the organization’s overall cybersecurity health and performance
         

  • Penetration Test

  • Do I need a Penetration Test - Questions to Consider

  • Why Choose The Mako Group?

LET'S WORK TOGETHER

Thanks! Message sent.

bottom of page