External network penetration tests

What is an external network penetration test?

A network penetration test aims to assess your network for vulnerabilities and security issues in servers, hosts, devices and network services. This generally includes:

  • Identifying and assessing all Internet-facing assets a criminal hacker could use as potential entry points into your network;
  • Assessing the effectiveness of your firewalls and other intrusion-prevention systems; and
  • Establishing whether an unauthorised user with the same level of access as your customers and suppliers can gain access to your systems via the external network.

Clients will receive information about the identified vulnerabilities in a format that allows them to assess their relative business risk and the cost of remediation. This information can be used to resolve the vulnerabilities in line with the network owner’s budget and risk appetite.

To find out more about our penetration testing services, get in touch with one of our experts today.

Speak to an expert


Did you know?

  • At least one vulnerability is found in 80% of external penetration testing engagements.
  • 65% of external network engagements identify at least one misconfiguration.
  • User credentials can be obtained in 33% of engagements.

    Under the Hoodie: Lessons from a Season of Penetration Testing, Rapid 7 (2018).

Breaking into external systems (those that communicate with the Internet) can be relatively simple if they have not been properly patched and secured against the latest threats. 

Once an external attacker has gained access to your network, they can access sensitive data, modify data, cause the system to operate abnormally or crash the system.


Is an external network penetration test right for you?

If you are responsible for your external network, you should ask yourself:

  • Are my systems fully patched and properly configured?
  • Are any systems or applications secured with weak or default passwords?
  • Have I accounted for all the services exposed to the Internet?
  • Could malware be present on my system?
  • Is every device secured by a correctly configured firewall?
  • Is my confidential information properly segregated or secured?

The benefits of completing an external network penetration test

Our penetration tests will help you:

  • Gain real-world insight into your vulnerabilities;
  • Identify any patches that need to be installed;
  • Reconfigure software, firewalls and operating systems;
  • Identify needs for encryption or more secure protocols;
  • Find the most vulnerable route through which an attack can be made; and
  • Find loopholes that an attacker could use to steal sensitive data.

Our engagement process

Our CREST-accredited penetration testers follow an established methodology based primarily upon the Open Source Security Testing Methodology Manual (OSSTMM). This approach emulates attackers’ techniques using many of the same readily available tools.

  1. Scoping: Prior to a test, our account management team will discuss the requirements for your network/infrastructure assessment to define the scope of the test.
  2. Reconnaissance: IT Governance will enumerate your network assets and identify any holes in your systems where malicious actors could break in.
  3. Assessment: Using the information identified in the reconnaissance phase, we test the identified hosts for potential vulnerabilities. 
  4. Reporting: The results will be fully analysed by an IT Governance certified tester and a full report will be prepared that sets out the scope of the test and the methodology used along with the risks identified. This will provide your organisation with the ability to produce an accurate threat and risk assessment.
  5. Re-test: We can provide access to our testers and the raw test data to support and expedite remediation. We can also retest your systems so that you can be sure all the issues have been successfully resolved.

Select your external network penetration test

We offer two levels of penetration test to meet your budget and technical requirements. 

Level 1: contact us for a quote

  • Identifies the vulnerabilities that leave your IT exposed.
  • Combines a series of manual assessments with automated scans, as our team assesses the vulnerability of your network.
  • Allows you to evaluate your security posture and make more accurate budgetary decisions.

Please contact us for further information
or to speak to an expert

Contact Us

Level 2: contact us for a quote

  • Attempts to exploit the identified vulnerabilities to see whether it’s possible to access your assets and resources.
  • Provides a more thorough assessment of your security posture, which enables you to make more accurate decisions about investing in securing your business-critical systems.

Please contact us for further information
or to speak to an expert.

Contact Us

How IT Governance can help you 

We are pioneers in offering easy-to-understand and quick-to-buy penetration testing.

You can choose the level of penetration test to meet your budget and technical requirements.

We provide clear reports that can be understood by engineering and management teams alike.

CREST-accredited penetration testing services give you all the technical assurance you need.


Companies using our penetration testing services

“IT Governance combines the delivery of real insights with a cost-effective service.”

Ian Kilpatrick, Group Information Security Officer at Collinson Group.


Speak to an expert

For more information and guidance on penetration testing or packages that IT Governance offers, please contact our experts who will be able to discuss your needs further.

top
Risk Assessment
Workshop
- 22 Oct