{"id":5590,"date":"2021-09-07T18:45:04","date_gmt":"2021-09-07T18:45:04","guid":{"rendered":"https:\/\/datasecc.com\/?page_id=5590"},"modified":"2021-09-07T18:50:24","modified_gmt":"2021-09-07T18:50:24","slug":"penetration-test-response","status":"publish","type":"page","link":"https:\/\/datasecc.com\/?page_id=5590","title":{"rendered":"Penetration Test Response"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5590\" class=\"elementor elementor-5590\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-636e0e16 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"636e0e16\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-23d23108 ot-flex-column-vertical\" data-id=\"23d23108\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-44f50151 elementor-section-full_width elementor-section-content-bottom ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"44f50151\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-434fb0bc ot-flex-column-vertical\" data-id=\"434fb0bc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7227efc7 elementor-widget elementor-widget-iheading\" data-id=\"7227efc7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ PENETRATION TEST RESPONSE<\/span>\r\n\t        <h2 class=\"main-heading\">BE PREPARED TO DETECT THREATS AND MALICIOUS ACTIVITY<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3cc78314 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3cc78314\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3fc7040 ot-flex-column-vertical\" data-id=\"3fc7040\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-82443c elementor-widget elementor-widget-toggle\" data-id=\"82443c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-8531\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-8531\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">The Defensive Perspective<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-8531\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-8531\"><p>To provide you visibility of insider threats and malicious activity. Penetration Test Response can help enhance your detection and response capability, as well as assist you in identifying sensitive data that has been accessed or stolen.<\/p><p>Penetration testing allows you to simulate a real-world attack scenario, it is looking at an attack from the offensive perspective. Our pen-test response service can provide a wholistic view from the defensive perspective to provide you with real-world recommendations on how to deal with an attack.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-8532\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-8532\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Simulate a Real-world attack scenario<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-8532\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-8532\"><p>The benefit of conducting forensics after a penetration test has taken place, is that many forensic artefacts will still be in place from the penetration test. This simulates a real-world attack scenario in which a forensic investigator would be requesting logs, and access to servers and\/or endpoints to perform analysis. By performing Penetration Test Response, gaps for existing security controls can be discovered, thereby improving the level of readiness for when an attack does occur.<\/p><p>Assumptions are often made that forensic artefacts will be available when required, however we have discovered in every Incident Response service we\u2019ve provided that there is always a significant gap in what evidence can be obtained due to these assumptions. Penetration Test Response will not only help train your team to know what to look for to detect future intrusions, it will also act as a security control gap assessment.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-09d1c85 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"09d1c85\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d2a858a ot-flex-column-vertical\" data-id=\"d2a858a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a1c092f elementor-widget elementor-widget-image\" data-id=\"a1c092f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"707\" src=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/apt-penetration-test-en-1024x707.jpg\" class=\"attachment-large size-large wp-image-2364\" alt=\"\" srcset=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/apt-penetration-test-en-1024x707.jpg 1024w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/apt-penetration-test-en-300x207.jpg 300w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/apt-penetration-test-en-768x530.jpg 768w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/apt-penetration-test-en-720x497.jpg 720w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/apt-penetration-test-en.jpg 1070w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\/\/ PENETRATION TEST RESPONSE BE PREPARED TO DETECT THREATS AND MALICIOUS ACTIVITY The Defensive Perspective To provide you visibility of insider threats and malicious activity. Penetration Test Response can help enhance your detection and response capability, as well as assist you in identifying sensitive data that has been accessed or stolen. Penetration testing allows you [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5590","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5590","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5590"}],"version-history":[{"count":7,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5590\/revisions"}],"predecessor-version":[{"id":5598,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5590\/revisions\/5598"}],"wp:attachment":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5590"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}