
Maximum user roles: 1
Maximum pieces of distinct functionalities: 10
Effort: Approximately 5 days
Description
About this service
Key benefits
Achieve and maintain compliance
and more.
Simulate the atacker's point of view
◼ Black box
Zero-knowledge attack
simulation. The penetration
testing team tries to infiltrate
your systems as a hacker
would, using only public data,
without prior knowledge of the
target.
◻ Grey box
Simulation of an insider attack,
where penetration testers act
as employees with legitimate
access but limited system
knowledge. This is the most
common pentest perspective.
◪ White box
Full-knowledge security
testing. Pentesters have
complete details about the
systems, network diagrams,
source code, and other targets
in scope.
Report and deliverables
Our report contains a high-level management summary and details of all vulnerabilities, classified based
on severity, risk, and likelihood. All issues are reported along with their respective mitigation controls.
The reports can be used for vendor and third party risk assessments, M&A due diligence, compliance,
and regulatory requirements such as SOC 2, PCI-DSS, HIPAA, ISO 27001, GDPR, CCPA, and others.
Blaze also provides a cybersecurity attestation letter that can be shared with customers and partners as
evidence of penetration testing.
Certified with CREST, OSCP, OSWE, OSCE
and other industry accreditations.
Performed by cyber security experts
Average duration between 7 to 25 business days

About Blaze Information Security
We like to present our team as ethical hackers who believe in technical excellence.
We are experts in offensive cybersecurity and our service portfolio is built to guarantee strong defenses of organizations worldwide.