What are you looking for?

Find answers and solutions to common cyber security services issues and questions. If you cant find an answer, contact us and we will be happy to help.
Please call our office at +91-9668200222 or email us with your question

Top ten most popular FAQs

Which Applications Do You Test?

First and foremost, We’ve tested several types of applications. Our vast experience and commitment to service allows us to support the following industries: Banking, Government Organisation,Insurance , Securities Brokerage, Investment Banking , Securities Trading, Investment Management, Securities Analysis, Financial Planning, eCommerce, Payment Gateway, Billing Systems, Pharmaceutical R&D, Pharmaceutical API, Pharmaceutical Drug Delivery, Food Wholesale, Online Gaming, Medical and Healthcare, B2B Software, Chemical R&D, Credit Services, and many more.

Why Should I have Penetration Testing?

Penetration testing should be performed for a variety of reasons. Some of the more common reasons why companies perform penetration tests include

  • Most relevant regulatory standards require penetration tests are performed.
  • Network penetration testing can identify vulnerabilities inadvertently introduced during changes to the environment, such as a major upgrade or system reconfiguration.
  • Web Application testing can be integrated into the QA process of the Software Development Life Cycle to prevent security bugs from entering into production systems.
  • Organizations, especially those acting as data custodians, are being required to have testing performed by their customers. Penetration testing can demonstrate a commitment to security from a customer perspective and provide attestation that their assets or services are being managed securely.

How Much Time Penetration Test Take?

The test can take at least 1-10 days depending upon complexity of application and depth of testing requirements. We always provide clients prior information and schedule test with planning so that there are no hitches when penetration testing takes place.

Will The Penetration Testing Will Affect My Daily Business Operations?

Although we take every effort to make sure that our penetration testing is not disruptive, there are instances that it can. Sometimes old servers, operating systems, or software driving your applications that hasn’t been properly patched may freeze up during the testing procedure. We always coordinate our efforts according to your schedule and can also accommodate testing after peak hours. It’s always best to have a member of your team to be able to readily access critical servers or infrastructure while the penetration testing is in progress so we can discover and eliminate any weaknesses during the penetration test, rather than ignore the situation and allow a malicious use.

What Qualifications Does Your Penetration Testing Team Have?

When a penetration testing provider is hired, the hiring company should expect that every penetration test team includes a dedicated project manager, a skilled and experienced test team, resource coordinator(s), and a point of escalation, At Threatsys, we have team of dedicated professionals who holds certifications like PMP, CEH, ECSA,CISSP,CISM, CISA,PCI QSA and PCI PA-QSA and ISO 270001 LA.

What Are The Costs For Doing A Penetration Test?

The cost for network penetration testing varies greatly. A number of factors are used to determine pricing including, but not limited to the scope of the project, the size of the environment, the quantity of systems, and the frequency of testing. always recommend fixed-fee basis model to eliminate any unexpected costs or unplanned expenditures. The quoted fee will include all resources and required time frame and scope of project.

Why Do I Need Threatsys If I Already Have A Firewall?

Security is about having multiple-layers and a firewall provides a critical layer, but it is only one of many areas that you need to consider. Threatsys can show you the gaps you may have in your security, where your security baseline is today and create a comprehensive security program to get your business at the optimal level of security and cost. A firewall is a great start, now let’s take security further to enable your business.

How do you assist with compliance requirements like ISO, PCI, HIPAA, SOC-2 and others?

Threatsys subscribes to the belief “Compliance IS NOT security”; however, Threatsys also understands compliance is a business requirement that cannot be ignored. Threatsys assists clients with security best practices, which in turn ensures compliance requirements are addressed and documented. We call this “Compliance Readiness”. Furthermore, Threatsys has partnered with national security audit firms for each specialising in compliance certifications such as ISO 27001, PCI, HIPAA / HI-TRUST, SOC-2, FISMA among others. These partnerships allow Threatsys to assist the Client with their “Compliance Readiness” as one who is familiar and trusted by our audit firm partners. The outcome is a streamlined work effort towards security maturity and compliance adherence.

We are too small to have any security problems, right?

Likely not true. Hacking and cyber threats are increasing daily and no business is immune, regardless of size. Tricks and tools have become so easy to use to hack into a company that all businesses are targets. Until now, enterprise grade security was only for those who could afford it. This is why Threatsys was founded, to provide a high quality, world-class security solution to small, medium, mid-market, and emerging enterprises a much lower price point.

What types of systems do you support?

We pride ourselves on being “ecosystem agnostic”: whether you use Google Apps or Office365, Windows or Mac, Android or iOS, we will support your team.  Need to install a server onsite or host one virtually on Amazon or Azure? We will support you.  Need to transition from one ecosystem to another?  We’ll be there for you.

Couldn’t find your answer? Ask a question