ქართული

Our Services

Project budget and terms are set individually according to selected services and infrastructure complexity in the given organization. Services are available for purchase not once only but also on a monthly basis.

Get Started
 
Vulnerability

Vulnerability and Penetration Testing

What is Penetration Testing?

Penetration Testing is a cyber attack imitation and is applied to identify security weaknesses in IT infrastructure (web pages, networks, inner and outer infrastructure of a company). Although companies most often employ defense mechanisms, they might still have imperfections, detecting of which can lead to hacking of the whole system.

Why Penetration Testing?

  1. Data damage/loss prevention: It’s the best way to determine whether your data is secure and to what extent, also helps check sufficiency of your defense system while being under attack.
  2. Security control: you might already be using different security systems such as Firewall, encryption, DLP and IDS/IPS systems. Pen testing allows you to assess the effectiveness of your defense systems and your team readiness to combat cyber threats.
  3. New systems/applications’ safety: When introducing a new product developed either by you or provided by other company it is necessary to test it before its launching in order to check its safety and connection to other products in existing infrastructure.
  4. Relevance: Pen testing is required by different regulations (e.g. PCI DSS). Effective Pen testing will enable you to successfully undergo audits.

What is included in Penetration Testing?

  • Remote scans and auditing of servers;
  • Common malware (e.g., Conficker, Stuxnet,etc) detection, 0-day malware;
  • Sensitive data search;
  • Web application auditing to identify possible vulnerabilities, such as SQL injection, XSS vulnerabilities;
  • Compliance Checks against public and government best practices from the NSA, CERT and CIS;
  • Advising for fixes to found problems;
  • General suggestions on what to change in server configuration;
  • Re-scanning everything after the fixes has been applied to the servers on;
  • Compiling a conclusive report on the results of applying the suggested security patches to the servers;


 
General Services

General Services

General services of [In] Secure Box are built on correct estimation of IT Security risks in your company - what might happen and how can it affect the company. While using our services you are not questioning competence of your IT staff, because the IT department is not able to solely secure your information completely. The leak can happen because of a hacker, ‘unfaithful’ co-worker, deceived staff member etc. The main goal of our company is to introduce the best practices in order to prevent damaging or stealing your data which can lead to financial or reputational losses.

What is included in General Services?

  • Defining data to be secured;
  • Identifying threats and detecting information leakage sources;
  • Safety and risks assessment;
  • Determining measures to be taken to ensure information safety;
  • Selecting data protection methods;
  • Integrating selected methods;
  • Integrity and safety management system monitoring and control;


 
Regular Services

Regular Services

Using our Regular Services lets you decrease IT security costs. Nowadays it’s too hard to find professional InfoSec specialists. And even if you find and hire one for a vast amount of salary, just one person cannot be responsible for all the technologies and security details your company uses. Cooperation with us gives you the best ways to secure your company with the less price. Our high-level professionals have a significant experience in cyber security.

What is included in Regular Services?

  • Regular scanning and flaw detection
  • Reporting on Zero-Day and One-Day vulnerability
  • Vulnerability assessment and penetration testing on a regular basis
  • Organization preparation for necessary certification and certificate integration
  • For the companies producing software - consulting about the product before its release and testing after release
  • Transactions control
  • Internal network monitoring
  • Timely detection of infected computers
  • Finding sources in case of information leakage
  • Social Engineering instructions preparation, staff training and testing


 
Other Services

Other Services

  • PCI DSS (Payment Card Industry Data Security Standard) introduction and certification preparation/consulting
  • Web applications auditing
  • Socket applications auditing
  • OWASP standards introduction
  • 2factor auth introduction
  • Malware Analysis
  • Safety policy analysis
  • Quick incident response and research
  • DLP (Data loss prevention)
  • WAF(Web Application Firewall)
  • IDS(Intrusion Detection System)
  • IPS(Intrusion Prevention System)
  • Information safety consulting services
  • Gambling games testing