Penetration testing features
Your penetration test includes:
Customized gray-box test based on your specific concerns
Prioritized recommendations to remediate and prevent additional vulnerabilities
System-friendly test from testers that go above and beyond to reduce business impact
Single point of contact for the assessment who quickly responds to your questions and requests
Free retesting to ensure proper remediation and patching
Test of any aspect of your security environment in a targeted way
Detailed reports both managers and engineers can understand
Real-world simulation through manual testing
![](https://cdn.prod.website-files.com/672118d386a0ee61ef1d8ee1/677c55c1ddd75e3865ec0531_penetration-testing-features.avif)
Get the help you need with minimal interruptions
Benefit from a tailored pen test experience
A SecurityMetrics penetration test is an excellent choice for those who want a high-quality test at a moderate price, with complimentary retesting.
Your SecurityMetrics penetration test will be customized based on your specific concerns and security needs so you can address your unique vulnerabilities without paying extra.
Get field-earned expert advice
SecurityMetrics Pen Testers undergo rigorous data security best practices training and want to help you get secure, not just check the compliance box.
Get access to all-star testers who understand how attackers think because they have actual real-world experience with the latest hacking techniques.
Discover vulnerabilities with minimal interruption
Pen tests can appear daunting when your primary concern is keeping your business up and running.
SecurityMetrics pen testers go out of their way to reduce impact to your business, so you get a system-friendly test that doesn’t interfere with your day-to-day.
Penetration testing types and services
External Penetration Test
External penetration tests are focused on discovering and exploiting external assets and services to simulate what an attacker would do to compromise systems or gain access to your company's internal resources.
Internal Penetration Test
Internal penetration tests are focused on discovering and exploiting internal assets and services to simulate how attackers would pivot through your network, escalate privileges, and compromise systems.
Application Penetration Test
Application penetration tests are focused on bespoke applications or APIs to simulate how an attacker would identify and exploit common web application vulnerabilities such as those listed in the OWASP Web Security Testing Guide.
Phishing Engagement
Did you know that 90% of breaches occur because of social engineering? Phishing Engagements are focused on identifying and exploiting employees through social engineering in order to gain access to your company's internal resources. Phishing Engagements can be added on to External Penetration Tests.
Mobile Penetration Test
Mobile penetration tests are focused on bespoke Mobile Applications to simulate how an attacker would identify and exploit common Mobile Application vulnerabilities such as those listed in the OWASP Mobile Application Security Testing Guide.
Network Layer Penetration Test
A network pen test is used to locate security issues within your design, implementation, and maintenance of servers, workstations, and network services.
Segmentation Checks
A network pen test is used to locate security issues within your design, implementation, and maintenance of servers, workstations, and network services.
Penetration testing steps
01
Scheduling and test preparation
During this phase, you will experience a pre-engagement conference call covering your pen test needs, methodologies, objectives, the scope of your pen test, and your pen test date. Closer to your pen test date, you will receive a questionnaire that collects the needed information and documentation. You will then work with your point-of-contact to ensure your office is prepared for the test and that you won’t experience any downtime.
02
Automated/manual testing
SecurityMetrics Pen Testers then attempt to find and exploit your vulnerabilities by using industry-standard methodologies. SecurityMetrics Pen Testers document everything they find, simplifying remediation.
03
Reporting and remediation
Within six weeks, you will receive your report, which includes a narrative of the pentest activities and details of identified vulnerabilities. The vulnerabilities will include recommended steps or actions for remediation. Once you have analyzed your report, you can work with a SecurityMetrics point-of-contact to receive advice on how to remediate and patch any weaknesses.
04
Retesting
Once you’ve finished your first remediation phase, your point-of-contact will schedule a retest of your system, checking for proper patching. Unlike many other pen testing firms, SecurityMetrics pen testing includes retesting in your initial quote.
![](https://cdn.prod.website-files.com/672118d386a0ee61ef1d8ee1/677ef94fa3f5b3695cd4c26b_privaxi-penetration-testing-steps.png)
You don’t have to wonder what comes next
Ready for Penetration Testing?
Request a QuotePenetration Testing FAQs
How much does a penetration test cost?
Penetration tests range in price, depending on the size of your network and specific needs. Tests usually range from $15,000 to $30,000. As a general rule, any "pentest" that is listed for less than $4,000 is likely not a real penetration test.
How long does a penetration test take?
At SecurityMetrics, we have customers who take weeks and some who take less time. It really depends on the complexity of your environment and what your objectives are.
Check out the Penetration Testing Timeline Checklist for more details.
What compliance standards require a penetration test?
There are many industry standards that require a penetration test, including PCI, SOC, HIPAA, GDPR, and more. For organizations that don't need to adhere to specific compliance standards elective pentests can be performed to gauge your security posture. Remember, if you make significant changes to your environment, you will need to perform a penetration test again.
What is the difference between a penetration test and a vulnerability scan?
Sometimes customers call asking about penetration testing and realize they actually just need a vulnerability scan. Vulnerability scans must be performed by someone who is a certified vendor. They are more affordable than a penetration test and completely automated. They focus on finding potential vulnerabilities and identifying them for you so you can go through the vulnerabilities and make the needed changes to test again. For PCI requirements, you must perform vulnerability scans once every 90 days.
Penetration testing tries to exploit the found vulnerabilities. Also known as ethical hacking, SecurityMetrics penetration testers start with your vulnerability scan and see if they can hack into your network. Penetration testing is much more hands-on and time-consuming, making it much more expensive than vulnerability scanning
What qualifications do SecurityMetrics pentesters have?
You should look for certain certifications when choosing a pentester. SecurityMetrics pentesters have CISSP, OSCP, BSCP, and more. SecurityMetrics pentesters want you to be safeguarded against threat actors, so they take their training and your pentest seriously.
SecurityMetrics also holds its own testing program once a year where pentesters go up against their own servers to determine any vulnerabilities and the effective rate of exploiting them. Sometimes pentest firms are doing as little as possible to sign you off. SecurityMetrics penetration testers want you to be safeguarded against threat actors, so they take your pentest seriously.
Resources
The following are related resources that we have prepared for you. Find more answers to your questions in our Learning Center.