Pen testing OR penetration testing is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit.
Application Security Testing
Application security is the use of software, hardware, and procedural methods to protect applications from external threats.
Vulnerability Scan Management
Vulnerability management is a continuous information security risk process that requires management oversight. There are four high level processes that encompass vulnerability management – Discovery, Reporting, Prioritization and Response. Each process and sub processes within it need to be part of a continuous cycle focused on improving security and reducing the risk profile of network assets.
Security information and event management (SIEM)
Security information and event management (SIEM) software products and services combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security alerts generated by network hardware and applications.