sponsored by Internet Security Systems, Inc.
Posted:  06 Apr 2003
Published:  01 Jan 2001
Format:  PDF
Length:  4  Page(s)
Type:  White Paper
Language:  English

A penetration test offers an invaluable and compelling way to establish a baseline assessment of security as seen from outside the boundaries the organization's network. Properly executed penetration tests provide evidence that vulnerabilities do exist and that network penetrations are possible. More importantly, they provide a blueprint for remediation in order to start or enhance a comprehensive information protection strategy.


A penetration test simulates covert and hostile network attack activities in order to identify specific exploitable vulnerabilities and to expose potential entryways to vital or sensitive data that, if discovered and misused by a malicious individual, could pose increased risk and liability to the organization, its executives and shareholders. Qualified security consultants who perform penetration tests attempt to gain access to online assets and company resources through the network, servers and desktops, from either the internal or external perspective, much like an intruder would. These results clearly articulate security issues and recommendations and create a compelling event for the entire management team to support a security program.

Internet Security | Intrusion Detection | Managed Security Services | Network Security Software | Security Audits | Vulnerability Assessments

View All Resources sponsored by Internet Security Systems, Inc.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement