IDENTIFY THREATS BEFORE THEY ATTACK

OnDefend strengthens our client's security posture by providing the preventative security testing and vulnerability management tools they need to reduce their risk and decrease their vulnerable IT surface area.

Secure Your Future

Strengthen Your Security Posture With OnDefend

We identify your company's IT vulnerabilities through our preventative security testing services. Then we provide the vulnerability management tools you need to efficiently and effectively remediate, thereby moving your company up the security maturity curve.

Defend Shield

Services

Strengthen Your Security Posture With Our
Cyber Security Testing Services

Vulnerability Assessment

Vulnerability Assessments

Identifies, quantifies and prioritizes vulnerable assets within your IT environment that can be successfully exploited by a cyber attack.

Vulnerability Assessment Consist Of...

  • We define and classify your network and system assets
  • We identify potential vulnerabilities associated with each asset
  • We levels of risk to your vulnerabilities
  • We provide a remediation plan to fix those vulnerabilities

Vulnerability Assessment Tests...

  • Network Infrastructure
  • Servers
  • Endpoint Devices
  • Enterprise Servers

Our Vulnerability Assessment Process...

  • 1. System and Service Discovery/Scoping
  •  2. Vulnerability Identification & Manual Verification
  •  3. Remediation Building Development
  •  4. Reporting
  •  5. Tracking of Findings
  •  6. Testing to Confirm Remediation
  •  7. Report & Presentation
  •  8. Reassessment
Our Process

What You Can Expect From Us...

Security testing results are only as good as the remediation that follows them. Therefore you will receive the following as part of our comprehensive results report:

  • Executive Summary: Summary of the purpose of the test as well as a brief explanation of the threats facing the organization from a business perspective.
  • Findings: A detailed, technical explanation of the findings of the test, steps and proofs of the findings as well as an overview of the underlying risks associated with the findings.
  • Conclusion & Recommendations: This section provides final remediation with vulnerability reparation recommendations and preventive future countermeasures.
  • All reporting is provided in an easy-to-import format based on our client’s specific requirements.

Manage Your Vulnerabilities With OnDefend VManage

All OnDefend clients receive OnDefend VManage, which is our complimentary and ground breaking cloud based Vulnerability Management System. This tool automatically uploads all test results and allows you to prioritize, track and fix your systems vulnerabilities making management more effective, your remediation teams more efficient and the executives more confident in your security program.

Your Value

Our Vulnerability Assessment provides you a comprehensive understanding of your IT infrastructure inventory, which assets are vulnerable to attack and how to fix those vulnerabilities before they are exploited.

Network Penetration Testing

Network Penetration Testing

Simulation of an external and/or internal cyber-attack that attempts to prove or disprove whether a real-world attack would successfully exploit critical systems and gain access to your sensitive data.

Network Penetration Tests Consist Of...

  • We identify and classify your vulnerable network assets
  • We exploit those vulnerabilities and identify their associated risk
  • We expose flaws in your company’s threat response plan
  • We provide a remediation plan to prevent future attacks

What Network Penetration Tests Assess...

  • Network Infrastructure
  • Servers
  • Endpoint Devices
  • Enterprise Servers

Our Network Penetration Process...

  • 1. Goals and Rules Scoping
  • 2. Intelligence Gathering – Recon and Mapping
  • 3. Vulnerability Analysis and Identification
  • 4. Exploitation
  • 5. Post Exploitation
  • 6. Remediation Exploration
  • 7. Report and Presentation
  • 8. Reassessment
Our Process

What You Can Expect From Us...

Security testing results are only as good as the remediation that follows them. Therefore you will receive the following as part of our comprehensive results report:

  • Executive Summary: Summary of the purpose of the test as well as a brief explanation of the threats facing the organization from a business perspective.
  • Findings: A detailed, technical explanation of the findings of the test, steps and proofs of the findings as well as an overview of the underlying risks associated with the findings.
  • Conclusion & Recommendations: This section provides final remediation with vulnerability reparation recommendations and preventive future countermeasures.
  • All reporting is provided in an easy-to-import format based on our client’s specific requirements.

Manage Your Vulnerabilities With OnDefend VManage

All OnDefend clients receive OnDefend VManage, which is our complimentary and ground breaking cloud based Vulnerability Management System. This tool automatically uploads all test results and allows you to prioritize, track and fix your systems vulnerabilities making management more effective, your remediation teams more efficient and the executives more confident in your security program.

Your Value

Our Network Penetration Testing provides you a true understanding of your companies risk by penetrating your organization’s IT environment, demonstrating what systems & data could be exploited and providing a remediation plan to prevent such attacks in the future.

Application Penetration Testing

Application Penetration Testing

Dynamic (app facing) or Static (code based) tests that identify exploitable vulnerabilities within your web or mobile application that could provide unauthorized access to sensitive data or critical systems.

Application Penetration Tests Consist Of...

  • We identify and classify your application security vulnerabilities
  • We exploit those vulnerabilities and identify their associated risk
  • We expose any flaws in the underlying code that allow unauthorized activity
  • We provide a remediation plan to prevent future attacks

What Application Penetration Tests Assess...

  • Dynamic application analysis
  • Static source code review

Our Application Penetration Process...

  • 1. Goals and Rules Scoping
  • 2. Intelligence Gathering – Recon and Mapping
  • 3. Vulnerability Analysis and Identification
  • 4. Exploitation
  • 5. Post-Exploitation
  • 6. Remediation Exploration
  • 7. Report and Presentation
  • 8. Reassessment
Our Process

What You Can Expect From Us...

Security testing results are only as good as the remediation that follows them. Therefore you will receive the following as part of our comprehensive results report:

  • Executive Summary: Summary of the purpose of the test as well as a brief explanation of the threats facing the organization from a business perspective.
  • Findings: A detailed, technical explanation of the findings of the test, steps and proofs of the findings as well as an overview of the underlying risks associated with the findings.
  • Conclusion & Recommendations: This section provides final remediation with vulnerability reparation recommendations and preventive future countermeasures.
  • All reporting is provided in an easy-to-import format based on our client’s specific requirements.

Manage Your Vulnerabilities With OnDefend VManage

All OnDefend clients receive OnDefend VManage, which is our complimentary and ground breaking cloud based Vulnerability Management System. This tool automatically uploads all test results and allows you to prioritize, track and fix your systems vulnerabilities making management more effective, your remediation teams more efficient and the executives more confident in your security program.

Your Value

Our Application Penetration Testing provides you a comprehensive understanding of your applications risk by identifying & exploiting vulnerabilities, demonstrating what assets & data could be exploited as well as providing a remediation plan to prevent such attacks in the future.

Email Phishing Campaigns

Email Phishing Campaigns

Simulates an email phishing scam attempting to engage your employees to attain sensitive information such as login credentials, network information, secure data and account information.

Email Phishing Campaigns Consist Of...

  • We simulate email phishing attacks and record your employee responses
  • We provide full campaign reporting and statistics per employee
  • Our results help train your employees during and after campaign
  • Your employees become aware and maintain a defensive posture with future emails

What Email Phishing Tests Assess...

  • The employees you want engaged.

Our Email Phishing Process...

We send random phishing emails throughout the campaign and monitor your employee’s behavior. This provides you with real data that shows how susceptible your organization is to a phishing attack, what kind of attack is working best and whether or not your team is improving over time.

What You Can Expect From Us...

Security testing results are only as good as the remediation that follows them. Our comprehensive report includes statistics from the campaign as well as suggested remediation steps for employee training.

Your Value

Our Email Phishing Campaign provides your company with an understanding of your employees risk to an email phishing attack including the data you need to create awareness and the training your employees need to take a more defensive posture when interacting with incoming emails.

Quote

By hiring an external company to break into your systems and expose your security flaws forces you to take action. It is their job to find flaws in your security system, so they will use the most advanced techniques to break in. This can help raise the bar on the security practices within your organization.

Paulo Marques,
Forbes Technology Council - 2016

Whats Important to You Shield

What's Important to You?

Your business is as unique as your security needs.

Decrease Risk
Decrease Risk
Compliance Requirements
Compliance Requirements
Budget
Budget

All OnDefend security services are completely scalable based on the size of your organization, project scope and security budget.

We Are Here For Your Security.
What Do You Need?

Get in touch with our team to find out how our services and products can eliminate your vulnerable IT surface area and reduce your risk to a successful cyber attack.