Mandiant Vulnerability Assessment
Identify and Mitigate Security Vulnerabilities that Advanced Attackers Could Exploit
We offer a complete portfolio of more advanced red teaming work and application, system, and infrastructure assessment services. These services include recommendations and risk mitigation strategies to help you improve your existing security posture and reduce the risk of a successful attack.
Our vulnerability assessment services evaluate the strength of your defenses against the attacks that are most likely to be used by attackers. Our consultants leverage methodologies from our incident response practice to provide the most in-depth and real world scenarios possible. Our consultants provide you with actionable recommendations. All findings are rated based on risk, probability of exploitation, and potential business impact. This allows you to address the issues that matter the most to you.
We custom tailor the exploitation and assessment work to your environment and goals. For example, you specify separate instances of critical data that cannot be lost and we attempt to break into the environment and access that data. Our red team often stealthily breaks into highly segmented and secure environments and develops creates ways of exfiltrating example data.
We have performed hundreds of security assessments and have identified thousands of critical vulnerabilities which exposed enterprises to external and internal attacks. Services include:
- Red team assessments
- External network vulnerability assessments and penetration testing
- Internal network vulnerability assessments and penetration testing
- Wireless security assessments
- Citrix assessments
- Network architecture and firewall review
- Social engineering
- Host and network device review
- Custom services as requested
Social Engineering and Physical Security
Security is only as strong as its weakest link. Unfortunately, the weakest link is often the employee. We have developed a portfolio of social engineering and physical penetration testing services to help you identify deficiencies in employee security awareness that can result in the accidental exposure of critical corporate information.
It is critical to test applications at regular intervals, especially after important changes to applications or before launching new applications. Regular application vulnerability assessments will help identify and remediate vulnerabilities and maintain an attacker-resilient web presence. Our extensive portfolio of application security assessments includes:
- Web and client-server application security assessments
- Mobile application assessments across most platforms
- Source code reviews for most common programming languages
- Sofware development lifecycle (SDLC) reviews
- Application architecture assessments
- Custom services as requested
- Database and middleware application assessments
"...the central narrative stayed the same: far too many organizations were unprepared for the inevitable breach, allowing attackers to linger far too long in compromised environments."
- M-Trends 2015
Our methodology and tools, which leverage our extensive experience in incident response, are adapted to mimic the approach that attackers typically use. The tools and methodologies used will vary based upon the exact scope and the technical characteristics of each environment under consideration.
Mandiant employs industry leading experts, many of whom are published authors and active in the security community. Consultants stay informed on the latest attack trends shared from our incident response investigations. Our consultants see the attacks that customers are faced with every day and know the tools and techniques that attackers use.
Mandiant has well-defined methodologies developed and refined over many years. These methodologies are designed to systematically flush out vulnerabilities and closely follow attacker techniques, tactics, and procedures.
We can conduct penetration tests and perform assessments across all major platforms including mobile devices, virtualized environments, SCADA environments, cloud deployments, and traditional enterprise applications. We custom craft some of our tools to evade detection and exfiltrate sample data (if requested).