black palm security offers a complete suite of customized cyber security services for a clients of all sizes. Using a thorough approach following industry best practices, we deliver world-class solutions to help you harden systems, assess risks, and reduce overall attack surface.
Let us help you find and track vulnerabilities in your network, systems, and applications before the bad guys do. We will conduct vulnerability scans, both internally and externally to identify weaknesses within your environment. Our VM services provides continuous monitoring to help reduce your attack surface.
External Penetration Testing
An external penetration test is a security assessment performed from outside the organization. The objective of the assessment is to determine if any attacker is able to breach the perimeter and gain unauthorized access to your infrastructure and data.
Web Application Testing
During a web application assessment, Black Palm will conduct a penetration test against your web applications based on the methodology outlined by OWASP. Using both manual and automated testing methods, we will identify vulnerabilities and misconfigurations that can be leveraged by attackers.
Internal Penetration Testing
Not all attacks come from outside the organization or from unknown threat actors. In our internal penetration testing engagements, we simulate scenarios where a disgruntled employee has launched an attack or an adversary has compromised an asset to gain access to the internal network. The goal of the internal penetration test is to identify what an attack can do once internal access is obtained such as moving laterally to other systems or exfiltrating sensitive data.
Threat Hunting and Detecting
With the ever-changing threat landscape, it is important to stay ahead of malicious threat actors. Our cyber team will proactively hunt suspicious activity occurring on your network
Managed Detection and Response
We understand most organizations do not have the resources or expertise for a dedicated Security Operations Center (SOC) team.
Red Team Attack Simulation
Our team provides full-scope Red Team exercises simulating the tactics, techniques, and procedures used by advanced adversaries.