Enhance your security with one of our Gold licences, combining monthly or weekly scans with a comprehensive five-day penetration test. Conducted within the licence period, this greybox pentest is performed with partial knowledge of the target system. This balanced approach provides a detailed assessment of your (web)application, detecting any vulnerabilities throughout the year.
Our Gold licences are valid for 1 year and cover 1 URL. They include:
- Choice between 12 scans (Gold) or 52 scans (Gold+)
- Scheduling of scans and timing of pentest in consultation
- Pentest led by expert ethical hacker
- Encrypted pentest report in PDF-format
- Choice between encrypted PDF or HTML report for scans
- Support for questions on all detected risks
- Unlimited rescans after solving high risks (not applicable for pentest)
- With a safe result you can feature our secure logo on your website. Read more >
At the end of the term, the licence period will be automatically extended by 12 months. We have a notice period of 1 month before the end of the licence.
-
Announcement
Timing and preparation details are provided well in advance via email.
-
Assessment
We manually assess the web application to optimise the configuration of the scanner.
-
Fine-tuning
With a discovery scan we test our login script to the account and limit similar pages from the scan.
-
Flexibility
You have the option to inform us of your preferred date and start time.
-
OWASP Top 10
SSL and known vulnerabilities are tested, such as Cross-Site Scripting (XSS) and SQL injections.
-
Duration
Depending on the size of the application, the scan may take up to 25 hours to complete.
-
Review results
We manually evaluate the results to ensure its successful completion.
-
Report
You will receive a secure, detailed report. It can be provided in either PDF or HTML format.
-
Check fixes
Consider requesting a rescan to verify addressing at least the high risks (this may incur additional costs).
-
Timing
Together, we will determine a start date. For starting dates within 2 weeks, please contact us first.
-
Scope
We define your goals beforehand to ensure a thorough understanding of your specific security objectives.
-
Mapping
Mapping helps us in understanding the application, enabling us to determine which tests are necessary.
-
Assessment
Both automated tools and manual techniques are used to identify weaknesses in the application.
-
Human logic
By using human logic, our hackers can find weaknesses that automated systems may overlook.
-
Structured
We rely on the Penetration Testing Execution Standard (PTES) to structure and streamline our testing process.
-
Results
Our ethical hacker will collect all findings and assign a risk level (high, medium, and low) to each identified vulnerability.
-
Report
A detailed, custom report will provide a substantiated analysis of the findings and recommendations for improvement.
-
Retest
It is advisable to perform a targeted test to verify the resolution of vulnerabilities (available at additional charge).