Penetration tests simulate real-world cyber-attacks on information systems or networks to detect and identify security vulnerabilities. The tests are conducted by specialised experts who systematically examine an organisation’s software applications, hardware and infrastructure.
Penetration testing allows us to determine not only the security of your systems, but also the resilience of those who protect them.
The result of the penetration test is a report that summarises the positive aspects of your current security and suggests specific solutions to address the weaknesses identifie
These are non-cooperative external penetration tests that include:
The output is a written report containing:
These are non-cooperative external penetration tests that include:
The output is a written report containing:
These are cooperative internal penetration tests that include:
The output is a written report containing:
These are non-cooperative external penetration tests that include:
The output is a written report containing:
These are non-cooperative external penetration tests that include:
The output is a written report containing:
These are cooperative internal penetration tests that include:
The output is a written report containing:
Phishing test
This service will include:
As part of the output from the phishing tests, you will receive a summary:
As part of this service, a telephone test will be conducted to see if the employee:
As part of the vishing test output, you will receive a summary:
This service will include:
As part of the output from the phishing tests, you will receive a summary:
As part of this service, a telephone test will be conducted to see if the employee:
As part of the vishing test output, you will receive a summary:
Talkey a.s. | IN: 091 01 942 | VAT ID: CZ09101942 | Personal data protection policy