Skip to main content

Penetration Testing


Harden your network to defend a cybercriminal’s malicious attack by having an SBS ethical hacker safely simulate a cyber-attack and exploit vulnerabilities. External Penetration Testing is the process of working from outside your organization’s network to discover, actively exploit, and report vulnerabilities that affect the confidentiality, integrity, and availability of your IT systems. 

A Penetration Test includes the following:

  • Conducted by an SBS consultant with knowledge of the institution’s environment.
  • Scan of the network from the outside for known weaknesses.
  • Testing includes an informed penetration test, network scan, and exploitation.
  • White-box and black-box testing available.
  • Comes with the TRAC™ Action Tracking module to assist institutions in automating their recommendation tracking.
  • Experienced consultants are available after the penetration test for guidance.
  • Test report is prioritized to address critical systems that indicate where possible risks may lie.
  • To supplement external penetration testing, SBS also provides testing services on internal and wireless networks.


SBS has adopted a six-step methodology for conducting external Penetration Tests that will ensure thorough and consistent results.

  1. Pre-Engagement Interaction
  2. Information Gathering
  3. Vulnerability Analysis
  4. Exploitation
  5. Post Exploitation
  6. Reporting

Penetration Test Methodology


  • An SBS ethical hacker with knowledge of your environment will execute your test and provide recommendations to mitigate the risks discovered.
  • Following your testing our experienced consultants are available to provide expert guidance to help determine the most important and appropriate steps needed in addressing results.
  • Easy-to-read, management-ready reports include testing results and recommendations to mitigate risks.
  • Customized solutions are available to fit the needs of a more complex test.
  • Automate your remediation action plan with complimentary access to the TRAC™ Action Tracking module.


    Testimonial Icon"FDIC examiner is here. He absolutely LOVES your stuff. He had not seen your network security and IT audit work before and has been praising you for the past two days!"  - Rhonda Stover, YNB