Ethical Hacking Lab

Having an information system that's open to one's customers, partners and employees is no longer a luxury. It's a necessity that enables to align oneself with fierce, global competition. These new requirements often favor functional evolutions over the logical systems security. Consequently, security lapses that are discovered on a system are quickly exploited, not only by experienced pirates, but often by "script-kiddies" that use automatic exploitation tools that are particularly disastrous for your infrastructure.

In this perspective, it is extremely important to conduct external and/or internal attacks simulation exercises by stepping into the shoes of a pirate and/or a malicious user. That's what we commonly refer to as Ethical Hacking. It's an independent assessment and objective analysis of risks linked to the information security of the target organization.


An Ethical Hacking Laboratory

DATAPROTECT's Ethical Hacking experts rely on a lab based on standards and methodologies of internationally recognized penetration tests, as well as on proprietary processes and a unique know-how. Consequently, the information system security is tested in actual real-world conditions of hacker attacks. It's just like the case of an airbag. It's impossible to be sure it is working without trying and testing it beforehand in real conditions.

Composed of experts in the field, our lab has led several missions of penetration testing. Keen on delivering quality services, our resources are continuously on the lookout for technological developments and in constant evolution of skills. In fact, all our experts are certified:

  • Certified Ethical Hacker (CEH)
  • Offensive Security
  • Certified Information System Security Professional (CISSP)

The fulfillment of the commitments

Aware of the confidential nature of our services, we have developed a communication protocol enabling us to exchange with our customers on a confidential basis so as not to compromise their sensitive information. Furthermore, each critical vulnerability that is detected by our experts is immediately communicated to the customer.


Our audit reports

At the end of the audit mission, a concrete and pragmatic action plan is generated. The audit findings will be delivered to the customer as vulnerability factsheets including:

  • The description of the vulnerability
  • The assets affected by the vulnerability
  • The risks associated with this vulnerability
  • The impact on the availability, integrity, confidentiality, and traceability of the information
  • The corrective measures to be implemented