Infrastructure Management
Server network and Infrastructure Management
Security Info Manager
Data Loss Prevention
Critical System Protection
Last Minutes Transfer
Enterprise Vault Control
Enterprise Vault.cloud
HIPAA, HITECH compliance
Project risk reduction
Unsecured Authenticatio
Cross-site scripting (XSS)
Price manipulationNew
Remote command execution
SQL / File Injection
Buffer overflows
Price Manipulation
Security Recommendation
SSH , FTP, HTTPD Securing
Public IP access
Vulnerability ScanNew
Remote File Inclusion
RootKit Hunter
Firewall Testing
Host Sysctl conf Hardening
TMP Hardening
Threats / Backups
Anti-Malware / Ransomware
LAMP Optimization New
Disk I/O
Tune TCP/IP
HTTP, FTP, DNS, SSH, MYSQL
DDOS and DNS attacks
Kernel parameters
Authentication Check
Cross Site CMS Scripting
Directory / ACL TraversalNew
Remote Code Execution
SQL or File injection Test
Malware Checking
Cross-Site Request Forgery
Security Recommendation
Pen Test Scopes and Rules
Fingerprinting and Version Scan
Client-Side Attacks
Pivoting Relays
Enumerating User Accounts
Packet Manipulation
Port Forwarding
DNS and DDOS
Authentication Check
Cross Site CMS Scripting
Directory / ACL TraversalNew
Remote Code Execution
SQL or File injection Test
Malware Checking
Cross-Site Request Forgery
Security Recommendation
Plugin Scan / Checking
Authentication Check
Cross Site Scripting
Configuration IssuesNew
Plugin Scan / Checking
SQL / File injection Test
Virus / Malware Checking
Upload Folder Test
Security Recommendation