8 Reasons You Need A Security Penetration Test - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
IT Leadership // Security & Risk Strategy
News
7/6/2016
07:06 AM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail

8 Reasons You Need A Security Penetration Test

One of the biggest challenges in IT security is determining whether the tools and configurations you have in place are giving your organization the level of security you require. Here's how penetration testing can help.
2 of 10

Identify Gaps Between Security Tools
Attacks directly focused on individual, enterprise-class security tools are largely unsuccessful. Attacks succeed by exploiting the gaps between different security tools. Some security tools mesh better with others, and a penetration test is one way to verify whether or not your network has significant gaps between security tools.
(Image: Peggy and Marco Lachmann-Anke via Pixabay)

Identify Gaps Between Security Tools

Attacks directly focused on individual, enterprise-class security tools are largely unsuccessful. Attacks succeed by exploiting the gaps between different security tools. Some security tools mesh better with others, and a penetration test is one way to verify whether or not your network has significant gaps between security tools.

(Image: Peggy and Marco Lachmann-Anke via Pixabay)

2 of 10
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
cr1ga
100%
0%
cr1ga,
User Rank: Apprentice
7/7/2016 | 10:57:41 AM
Starting Point
I think the idea of Penetration Testing is something all companies should consider. The problem I have is when an outside company is employed to perform the test; the first thing they ask for is a list of IP address and then request opening ports for their testing equipment.

If a company is hired for testing then that company should search for all holes not just the known problems. A hacker doesn't call and ask for assistance.
News
IBM Puts Red Hat OpenShift to Work on Sports Data at US Open
Joao-Pierre S. Ruth, Senior Writer,  8/30/2019
Slideshows
IT Careers: 10 Places to Look for Great Developers
Cynthia Harvey, Freelance Journalist, InformationWeek,  9/4/2019
Commentary
Cloud 2.0: A New Era for Public Cloud
Crystal Bedell, Technology Writer,  9/1/2019
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
Data Science and AI in the Fast Lane
This IT Trend Report will help you gain insight into how quickly and dramatically data science is influencing how enterprises are managed and where they will derive business success. Read the report today!
Slideshows
Flash Poll