Skip to main content

In the age of “Internet of Things”, we see a proliferation of evolving cyber attacks targeting organizations and businesses. Cyber attacks might be intangible, but their impacts are acutely felt: there is a growing risk of disruption, information loss, reputation damage and material cost to clients of different fields. The Vulnerability Assessment (VA) services provided by Thales allow clients to have better knowledge of their vulnerabilities and how these could be addressed. To take things to the next level, Thales’s accredited cybersecurity consultant can conduct a Penetration Test (PT) which demonstrate how these vulnerabilities could be exploited against the interest of clients.

The VA and PT represent the first step and the next in the journey of cybersecurity. Clients can enjoy affordable services from Thales and better safeguard their businesses against loopholes and potential attacks. With a comprehensive VA report produced by our consultants, clients are well-informed of the current status of their information security and can respond by forming corresponding policies. PT, as an extension of VA, demonstrates the exploitability of the clients by attacking their system in a synthetic environment. Clients can experience the “worst-case-scenario” without the incurrence of actual damages. They can be assured that they are in safe hands: all the processes are Quality ISO9001 compliant.

By utilizing a set of intrusion testing tools and manual exploitation techniques, an experienced team of Thales experts will perform a deep analysis of clients’ information networks to determine the extent of their vulnerabilities, which will be categorized against a criteria of Criticality, Exploitability, Impact and Probability to establish underlying risk levels. These vulnerabilities will be exploited by our consultant in the synthetic environment thanks to our Cyber Integration and Innovation Centre. The details of the discovered issues are documented in the report to help illustrate the current state of their IT security posture.