BreachLock Vulnerability Assessment
Get Started Now
BreachLock™ Vulnerability Assessment benefits
Request security testing with a click
Forget old school ways of engaging experts and reading manuals to configure scanners. BreachLock™ is a SaaS based security testing platform built for the cloud. Detect exploitable vulnerabilities with manual AWS penetration testing and other cloud platforms
Cloud based and easy to use
You can access the BreachLock™ platform using any browser. Your access is protected via two factor authentication. No software or hardware is required. You can have multiple users within your organization to help collaborate and fix the findings.
Leverage whitehat hacker knowledge
The BreachLock™ platform gives you the ability to interact directly with our security experts and support staff. No more lengthy emails and phone calls. Just click on a create ticket button next to each finding thats listed in your secured login area within the SaaS and ask your question.
Fast, scalable and effective
With the BreachLock™ platform you can order quarterly manual penetration tests or an on-demand manual penetration test if and when required. You get added value because we augment the manual tests with our AI powered monthly scans. You get email alerts whenever a new vulnerability is discovered.
Run scheduled and on demand scans
Scheduled vulnerability assessment ensure scans to run automatically at regular intervals so you don’t have to manage your scanning manually. You can also run an on demand scan on one or more assets with a click.
Cloud powered solution
Our manual penetration testing and automated vulnerability scanning capabilities are built with the cloud in mind. From our cloud platform, we deliver vulnerability management offerings suitable for Infrastructure as a Service (IaaS), Platform as a Service (PaaS), or Software as a Service (Saas). The BreachLock™ vulnerability asessment is suitable for all types of cloud environments.
Fast and reliable Vulnerability Detection
Increase the frequency of your tests and extend their coverage by using the BreachLock™ platform. New vulnerabilities emerge every day and yearly penetration tests are not enough. BreachLock™ helps you identify and fix the latest security issues, keeping your web application safe using a combination of manual penetration tests and ongoing automated scans.
Say no to false postives
Our security researchers and penetration testers reduce false positives and investigate potential issues. We make use of artificial intelligence and machine learning algorithm automation makes regular assessments possible.
4 Steps to execute Vulnerability Assessment with BreachLock
Onboarding clients onto our SaaS
Before we begin testing, BreachLock™ along with your company will determine the full scope that will be tested. Clear and open discussion with the customer is integral at this step. All communication is facilitated via our SaaS portal which enforces our methodical approach and promotes collaboration between teams. At this stage, we determine the companies’ infrastructure such as domains, servers, and other devices with IP addresses. We then determine if any should be excluded and why. Once we have a list of all of the devices to be tested we can then define the testing duration.
Executing Penetration Testing
We begin to attack vulnerabilities and known weak spots with your web application. We perform this step with the utmost care in order to protect both the web app and your data. We repeat the penetration process using both manual processes and automated tools. We use many methods such as those prescribed in OWASP methodology. Utilizing our SaaS, we are able to scan your systems in order to find the vulnerabilities that are putting your data at risk. The results of this phase are recorded in PDF and online reports that are made available to you within our SaaS portal.
Remediation of Vulnerabilities
The BreachLock™ team collects and compiles all of the obtained information and provides the customer with an exhaustive report. We also include comprehensive recommendations to aid business leaders as well as the IT team in order to make logical decisions regarding web application security. We provide a list of each vulnerability, including how we tested and how we recommend resolving the risk. At this stage, we provide specific technical details using which the IT team can act quickly. Our online ticketing system can be used to ask any questions to BreachLock™ security researchers.
Retest for Validation of Fixes
After both the business leaders and the IT team are able to read the report and act during the remediation process, we will retest to determine the effectiveness of findings resolution. We will rerun our penetration test on the web application. As a result of the retest, you can download an updated report from within our SaaS portal. This report will either show a clean build or a patched vs not patched status for each finding. If all vulnerabilities are solved we will also issue you a security certificate valid for 12 months.
BreachLock hosts its SaaS on AWS. We know how cloud technologies work and continously study these best practices. Unlike your next door security testing vendor Breachlock specizes in finding security gaps for your cloud applications.
Pen Testing at DevOps Speed
Requesting a penetration test on your latest release is as simple as clicking a button. Our security researchers swing into action and replicate hacker-like manual penetration testing activity on your cloud infrastructure and applications. You get online as well as PDF reports with screenshots of hacked areas.
Dynamic App Security Tests
Run a Dynamic App Security Tests any time you deploy a release on your staging environment. The scan covers both authenticated and non authenticated parts of the application and produces detailed reports with vulnerabilities and suggestions on fixes.
Automated Vulnerability Scans
Run automated scans on your cloud instances to ensure that the operating systems don't leak sensitive information or give way to hackers. Each finding is validated to ensure that you see no false positives despite the automated nature of these scans.
Stay Compliant
Demonstrate your compliance by introducing multiple checkpoints for security validation before you deploy changes in production. Each finding can be retested after fixes have been deployed. This ensures that you fix application security gaps continuously and prevent any misconfiguration of underlying platforms.
Learn more about BreachLock. Read our
FAQ PageOur Blog Posts
Types of Application Security Testing
As we are getting more reliant on various applications to make our life easier, our attack surface is growing. In this article we explain black box, white box and grey box penetration testing.
Read MorePCI DSS and Penetration Testing
The first version of the PCI DSS standard was released in 2004 for laying down the minimum security requirements when it comes to handling and managing customers’ card information. Over the years, different versions have been introduced, and at present, version 3.2.1 is the latest version released in May 2018.
Read MoreNetwork Penetration Testing Fundamentals
While conducting a network penetration testing activity, the primary goal of the network penetration testers is to identify vulnerabilities which can be exploited by the attackers in an organization’s network devices such as routers, switches, systems, hosts, etc.
Read MoreIntroduction to Penetration Testing
Penetration tests (Pen test) can evaluate both the strengths as well as weaknesses of either a single computer system or an entire organizational network of devices.There are three methodologies used in penetration testing: black box, white box, and grey box testing.
Read MoreDummies guide to AWS Penetration Testing
Last year, there have been many AWS breaches exposing various types of vulnerabilities including leaking S3 buckets, compromised AWS environments and misconfigurations. Now more and more organizations are moving to the cloud and adapting modern technologies into their development operation.
Read MorePenetration Testing: Automated v. Manual
Penetration testing as a service is offered in many forms such as web application penetration testing, application penetration testing, network penetration testing, cloud penetration testing, IoT penetration testing, etc. Moreover, with organizations’ development strategy shifting towards CI/CD environments, penetration tests need to be conducted at DevOps speed.
Read More