Threat Vulnerability Assessments
- Security experts with years of in-depth, practical experience
- Proven testing and assessment methodologies
- Interactive engagements
- Industry standard auditing processes
- Security experts with years of in-depth, practical experience
- Proven testing and assessment methodologies
- Interactive engagements
- Industry standard auditing processes
Comprehensive Assessments and Penetration Testing
Do you know how vulnerable your organization is to malicious hackers and criminals? How secure are your systems, applications, hardware, and your people? The only way you can know for sure is by testing for every possible vulnerability.
TELUS offers a comprehensive range of assessments to help you identify weaknesses – the first step in strengthening your defenses.
Key Features and Benefits:
Infrastructure Vulnerability Assessment
An evaluation of any weaknesses or vulnerabilities that can expose your organization’s systems and information to malicious exploitation, and recommendations for remediation.
Infrastructure Offensive security (full penetration testing)
A pro-active, multi-stage evaluation of your organization’s security practices by attempting to exploit your environment, occupy it and create a presence in the same way a malicious attacker would do.
Web Application Vulnerability Assessment
An evaluation of any weaknesses or vulnerabilities that can expose your organization’s web applications to malicious exploit and recommendations for remediation.
Web Application Manual Assessment (full penetration testing)
A pro-active attempt to exploit a target environment in order to evaluate the vulnerabilities of your web applications.
PCI assessments
We’ll help determine the robustness of your existing processes, controls, and standards to safeguard the confidentiality, integrity, and privacy of client payment card information, including:
- Internal network vulnerability scans (PCI DSS 11.2.1 and 11.2.3 requirement)
- consulting services for external vulnerability scans via a PCI Council Approved Scanning Vendor (ASV) (PCI DSS 11.2.2 and 11.2.3 requirement)
- internal and external penetration testing (PCI DSS 11.3 requirement – 11.3.1 – 11.3.4)
Physical and digital Social Engineering – including email phishing Assessment
Social Engineering is the psychological and social manipulation of individuals in order to gain proprietary information. It combines physical and digital methods to gain confidential information and/or access. TELUS will assess your key personnel and identify any potential weaknesses to social engineering attacks.
Stay informed
More ways to connect
All communications will be coming from TELUS Business (Marketing Preferences, 30th Floor, 25 York Street, Toronto ON M5J 2V5, telus.com). You can unsubscribe at any time.