Kentdome brings value added solutions and network-centric services to businesses worldwide. Our commitment and focus is always based on providing significant economic value to our customers and partners while maximizing the human benefit and productivity of our users.

Kentdome

The areas of our expertise range from network infrastructure and custom solution development to information security. While these are distinct competencies, they actually complement each other quite nicely and our commitment to the success of our clients and their business is evident in the extraordinary results we deliver for them.

Kentdome brings value added solutions and network-centric services to businesses worldwide. Our commitment and focus is always based on providing significant economic value to our customers and partners while maximizing the human benefit and productivity of our users.

The areas of our expertise range from network infrastructure and custom solution development to information security. While these are distinct competencies, they actually complement each other quite nicely and our commitment to the success of our clients and their business is evident in the extraordinary results we deliver for them.


The only difference between pentesting and hacking is ethics

Kentdome offers comprehensive penetration testing to secure your information assets from attackers both inside and outside your network. A critical complement to vulnerability scanning, penetration testing proves the extent to which vulnerabilities can be exploited. A penetration test is a proactive and authorized attempt to compromise information security and access sensitive data by taking advantage of vulnerabilities.

Our penetration testing services mimic an attacker intent on accessing your organization's customer data, financial records and other sensitive information. We target a point of entry via your network or application infrastructure's "weakest link", which may be visible to employees and partners in addition to external hackers. We then determine the business impact of gaining access to your network and its resources.

For each engagement, we work with you to define the attack profiles most appropriate for your organization.


Please inquire about our FREE pentesting service(s) for non-profit organizations.


We offer the following types of testing:

  • Vulnerability Assessment to validate your host configurations and get an accurate accounting of vulnerabilities in your environment that pose a real risk to your organization.
  • Penetration Testing which goes further to help your organization meet compliance requirements and shows how an attacker would gain unauthorized access to your environment by compromising your email systems, firewalls, routers, VPN tunnels, web servers and other devices.

Key Benefits:

  • Identify security risks: our security experts identify the information assets at risk
  • Identify test readiness: depending on your maturity, our testing services help address your security
  • Meet compliance: experienced testers understand compliance requirements
  • Improve security: obtain a prioritized list of actionable items to address

90%

In nearly 90% of cases, hackers relied on computer bugs that have been around since 2002.

317000000

More than 317 million new pieces of malware are created each year, that is an estimated one million new threats released every day, with varying levels of sophistication.

113%

Cyberthieves are increasingly blackmailing victims with a 113% surge in ransomware attacks.

Data derived from collaborative reports by Symantec and Verizon from 2014