The Digital Scepter Web Application Vulnerability Assessment is a comprehensive evaluation of your company’s website for vulnerabilities. These vulnerabilities can be exploited by attackers in order to gain access to your company’s data, your company systems, or, most critically–your customer data.

The Digital Scepter Web Application Vulnerability Assessment uses a combination of manual and automated techniques in order to emulate real-world attack scenarios. Testing coverage includes:

  • Information Gathering
  • Application Mapping and Analysis
  • Input Validation
  • Authentication
  • Session Management
  • Access Control
  • Business Logic
  • Infrastructure Testing
  • Miscellaneous Checks

The key advantage of the Digital Scepter approach is the focus on manual testing over the use of automated tools. Digital Scepter testers have years of experience in application security testing and perform manual reviews of the target websites using automated tools only to supplement their manual results. This results in a massive reduction in false negatives when compared to the automation-based approaches used by most competitors.

Results will be presented in a clear and concise PDF format that provides both a management summary of all results as well as sufficient detail for each vulnerability. Vulnerability details will include an overview of the issue, the chances of an attack taking place, the potential impact if exploited, and information on how to remediate.

Key Offering Takeaways:

  • Manual vs. automated testing focus
  • Full coverage of all application components
  • Use of highly skilled and experienced testers
  • True emulation of attacker techniques
  • Clear, concise reporting that enables quick remediation

Contact us today for a free, no-obligation consultation.

One Response to “Web Application Vulnerability Assessment”

  1. Digital Scepter Services : Digital Scepter Corporation on November 13th, 2012 7:14 am

    [...] The Digital Scepter Web Application Vulnerability Assessment is a comprehensive evaluation of your company’s website for vulnerabilities. These vulnerabilities can be exploited by attackers in order to gain access to your company’s data, your company systems, or, most critically–your customer data. Click here to learn more. [...]

Got something to say?

You must be logged in to post a comment.