Transfortune

Virus and Trojan detection

This project corresponds to the national information security evaluation criteria as a starting point to correspond to information security standards rectification plan for the end of their core information systems penetration testing services.

Penetration testing is based on the availability of known security vulnerabilities, to find out whether there is a corresponding information assets, usually evaluation method for assessing the results of a more comprehensive penetration testing pay more attention to security vulnerabilities comprehensiveness.

Penetration testing on the one hand the effectiveness of security measures from the angle of attack of the inspection business systems, whether the security policy been implemented; on the other hand can tell potential security risks by way of real events stand out, thus helping to raise awareness of relevant personnel level of safety issues. After the penetration test, immediately safety reinforcement, testing found resolve security issues, so as to effectively prevent the occurrence of real security incidents.