Spirent SecurityLabs

Spirent SecurityLabs의 서비스는 고객의 조직에 최소한의 영향을 미치면서 효과가 높은 결과를 산출하도록 구성됩니다.경험이 풍부한 보안 전문가들로 구성된 당사의 전문 팀이 네트워크, 무선, 웹사이트, 모바일 앱, 임베디드 디바이스, 소스코드 분석 등 다양한 용도에 대해 폭넓은 스캔, 침투 테스트, 모니터링 서비스를 제공합니다.

데이터 시트 보기→

Breaching the External Network Security Perimeter

On-Demand Webinar

Network security device vendors are stepping up and doing a decent job at preventing external attacks on your network infrastructure but attackers are always looking for innovative ways of breaking in. In this on-demand webinar, we will explore various techniques to walk around such protections and gain access to the internal network as an outsider with access to nothing but Internet.

White Paper

This paper discusses the technical details involved with open-source intelligence gathering and using that intelligence to penetrate an organization’s perimeter and gain access to the internal network. We will also describe several protection mechanisms that organizations can implement to protect themselves against such attacks.


Networks and wireless

In depth testing of your networks to uncover exploitable vulnerabilities, including insecure server/firewall configuration, unpatched servers with known vulnerabilities, rogue access points, eavesdropping, information leakage and improper error handling.

Wireless testing includes checking wireless access points in range, presence of rogue devices, physical access to the wireless, weak encryption usage and security of the access points connected to the wired network.

Web and mobile applications

Scalable testing from OWASP Top 10 to comprehensive penetration testing of mission critical applications ensuring all applications within your organization are routinely tested for risk to evolving threats.

For mobile applications we also test binary code, related web services and http(s) communication for dynamic analysis and device end security.

Devices

Comprehensive testing of devices including those used for networking, connected vehicles, and various IoT uses including monitoring, supply chain, facility management, and manufacturing process.

We assess the device firmware, binary code, related web services and http(s) communication for exploitable vulnerabilities, discover and exploit underlying web application for security weaknesses such as authentication bypass, authorization boundary, CSRF & XSS in Embedded Web Application Servers and many others.

소스코드 분석

일부 보안 취약성은 코드가 컴파일 되면 식별하기 어렵습니다. 당사의 코드 검토 서비스는 버퍼 오버플로우, SQL 주입 결함, 백도어, 인증 우회 및 권한 부여 제한과 같은 잠재적 취약성을 찾아냅니다. 정적 (비 실행) 소스 코드 분석에서 Taint Analysis 및 Data Flow와 같은 기술을 사용하여 개발 라이프 사이클에 보안을 구축 할 수 있습니다.

보안 어플리케이션, 네트워크 및 디바이스의 중요성이 어느 때보다 높은 시대입니다

오늘날 주의깊게 작성한 디지털 코드로 표현되는 아이디어는 여러 기업과 국가의 안전장치를 우회해왔습니다. 비즈니스의 세계에서도 이러한 디지털 코드는 민감한 비즈니스 및 사용자 데이터를 훔치기 위해 기업들의 방어막을 뚫고 침투하고 있습니다. 이러한 공격 중 일부는 수십억 달러의 글로벌 브랜드가 수 십년에 걸쳐 구축한 신뢰와 선의를 훼손한 경우도 있습니다.

가장 정교하고 계층화된 사이버 보안은 여전히 많은 취약성을 포함할 수 있습니다.이러한 취약성을 찾아내고 악용하는 방법을 개발하기 위해서는 창의적이면서 끈질긴 인간의 독창성이 필요합니다.

이것이 침투 테스터의 임무입니다.

윤리적 해킹 훈련을 통해 귀사 조직 내의 보안 약점과 디지털 위험을 누군가 우발적으로, 또는 악의적으로 찾아내기 전에 이를 먼저 밝혀낼 수 있습니다.

백서 다운로드 →

Connected Vehicle Resources

On-Demand Webinar

Learn about the growing threat landscape for connected vehicles as they incorporate more “smart” features to become increasingly connected with outside services and how to better secure critical systems.

Watch now →

Securing the Connected Vehicle

Preventing, detecting, and remediating cyber-attacks have been an important security concerns for the technology industry. But as the new world of connected devices converge, the personal vehicle has become a target.

Download white paper →

Spirent Automotive Solutions

With Spirent, you can test, refine, and optimize all aspects of in-car, V2V, and V2X connectivity to provide the experiences that modern drivers and passengers demand.

Learn more →

Connected Vehicle Resources

On-Demand Webinar

Learn about the growing threat landscape for connected vehicles as they incorporate more “smart” features to become increasingly connected with outside services and how to better secure critical systems.

Watch now →

Securing the Connected Vehicle

Preventing, detecting, and remediating cyber-attacks have been an important security concerns for the technology industry. But as the new world of connected devices converge, the personal vehicle has become a target.

Download white paper →

Spirent Automotive Solutions

With Spirent, you can test, refine, and optimize all aspects of in-car, V2V, and V2X connectivity to provide the experiences that modern drivers and passengers demand.

Learn more →

귀하의 사업에 적합한 제품을 찾기 위해 도움이 필요하십니까?

연락하기 →