{"id":3607,"date":"2019-05-02T07:43:48","date_gmt":"2019-05-02T07:43:48","guid":{"rendered":"http:\/\/localhost\/wordpress\/?page_id=3607"},"modified":"2019-11-15T07:29:25","modified_gmt":"2019-11-15T07:29:25","slug":"penetration-testing","status":"publish","type":"page","link":"https:\/\/infogistic.com\/home\/penetration-testing\/","title":{"rendered":"Penetration Testing"},"content":{"rendered":"<div class=\"wp-block-image\"><figure class=\"alignright\"><img loading=\"lazy\" decoding=\"async\" width=\"276\" height=\"200\" src=\"http:\/\/infogistic.com\/home\/wp-content\/uploads\/2019\/09\/infosec-services.jpg\" alt=\"\" class=\"wp-image-4425\"\/><\/figure><\/div><p class=\"PenTesting-p\"> Penetration Testing is conducted to test the security of the digital boundaries of an organization. The endpoint systems, email users, password &amp; entities, mobile devices, network devices, web applications and servers are tested through simulations of attacks to gain access to the sensitive information. Penetration testing could be a black box, grey box or white box conducted from either internal or external to the organization. <\/p><p class=\"PenTesting-p\"> <b style=\"color:#207146;\">INFOGSITIC\u2019s<\/b> approach for Penetration Testing takes input from OSSTMM (Open Source Security Testing Methodology Manual) and OWASP (Open Web Application Security Project). <\/p><h3 class=\"PenTesting-h3 wp-block-heading\">Benefits<\/h3><ul class=\"PenTesting-ul wp-block-list\"><li>360 degree review of security posture of an organization<\/li><li>Identification of risks related to information security<\/li><li>Identification of missing controls across process and technology<\/li><\/ul>","protected":false},"excerpt":{"rendered":"<p>Penetration Testing is conducted to test the security of the digital boundaries of an organization. The endpoint systems, email users, password &amp; entities, mobile devices, network devices, web applications and servers are tested through simulations of attacks to gain access to the sensitive information. Penetration testing could be a black box, grey box or white [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3607","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/infogistic.com\/home\/wp-json\/wp\/v2\/pages\/3607","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infogistic.com\/home\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infogistic.com\/home\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infogistic.com\/home\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infogistic.com\/home\/wp-json\/wp\/v2\/comments?post=3607"}],"version-history":[{"count":2,"href":"https:\/\/infogistic.com\/home\/wp-json\/wp\/v2\/pages\/3607\/revisions"}],"predecessor-version":[{"id":4684,"href":"https:\/\/infogistic.com\/home\/wp-json\/wp\/v2\/pages\/3607\/revisions\/4684"}],"wp:attachment":[{"href":"https:\/\/infogistic.com\/home\/wp-json\/wp\/v2\/media?parent=3607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}