menu x

HACKER AS A SERVICE

The most effective way to validate your business resilience.

Vulnerability Analysis

Comprehensive vulnerability scoping with pre-defined scope, with validation of results and corrective action plan .

Pentest

Vulnerability analysis and exploitation with pre-defined objectives, benchmarking of security and compliance controls.

Red & Purple Team

Simulation of advanced invasion scenarios with defined objectives can measure detection and remediation capacity.

70%

of vulnerabilities can negatively impact your business

61%

High Critical Vulnerabilities Allow Network Access

92%

of critical infrastructure vulnerabilities are update failures

+103

days is average time spent by companies to correct a vulnerability

SANS, EC-Council, Offensive Security and EXIN Certification.

Technical support by a team of professionals specialized in Information Security.

Specific recommendations, technical correction and detailing of each vulnerability.

Safety indicators during the fault remediation process.

IBLISS Hacker as a Service performs a detailed analysis of your corporate environment to provide a comprehensive and detailed account of the weaknesses of your security strategy.

The IBLISS HaaS modalities vary according to the motivator and purpose of the safety analysis. The tests are performed by a team of professionals with a high level of expertise, certified by leading industry references such as SANS, EC-Council, Offensive Security and EXIN. The results are delivered in the GAT, from IBLISS, which offers the technical details of each vulnerability, specific recommendations for correction, technical support and safety indicators to follow the process of remediation of the found failures.


Main purpose

Scope

Skill level

Can be run locally

Can be run remotely

Vulnerability scan

Validation of false positives and consolidation of vulnerabilities

Manual analysis *

Vulnerability exploration

Phishing

Social Engeenering (phone)

OSINT - Open Source Intelligence 

Wireless

Physical tests

Technical Report

GATs Vulnerability Management

Results presentation

Technical support during fix

Retest

vulnerability analysis

Full scan

Identification and validation of all vulnerabilities in the defined scope

Medium








(60 days)

(remotely)

hours

1 time only

compliance 

PENTEST

Full scan

Identification and validation of all vulnerabilities in the defined scope

High







(60 days)

(remotely)

hours

time only

standard 

PENTEST

Specific goal

Threat modeling

High

(if necessary)






(60 days)

(in loco / remote)

hours

time only

advanced PENTEST

Specific goal

Threat modeling

High

(if necessary)

(60 days)

(in loco / remote)

hours

time only

REMOTE red team

Specific goal

Threat modeling

High


(if necessary)

(60 days)

(in loco / remote)

hours

time only

in loco

red team 

Specific goal

Threat modeling

High


(if necessary)

(60 days)

(in loco / remote)

8 hours

time only

purple team

Identification and remediation

Predefined use cases

High

(if necessary)


(60 days)

(in loco / remote)



Know your weaknesses

Evaluate the strength of your security strategy with IBLISS Hacker as a Service before someone else does it for you.