[vc_section css=”.vc_custom_1646121983724{background: #0a2044 url(https://infrasec.proxsisgroup.com/wp-content/uploads/2022/03/Headline-Background.jpg?id=1837) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_row css=”.vc_custom_1575622492915{padding-top: 120px !important;padding-bottom: 100px !important;background-color: rgba(10,32,68,0.7) !important;*background-color: rgb(10,32,68) !important;}”][vc_column width=”7/12″][vc_empty_space height=”20px”][vc_custom_heading text=”Vulnerability Assessment & Penetration Testing” font_container=”tag:h2|font_size:4rem|text_align:left|color:%23ffffff|line_height:1″ use_theme_fonts=”yes” css_animation=”fadeInUp” el_class=”custom-hd delay-2″][vc_separator color=”white” align=”align_left” border_width=”5″ el_width=”10″ css_animation=”fadeInUp” el_class=”delay-4″ css=”.vc_custom_1540432882259{margin-bottom: 50px !important;margin-left: 5px !important;padding-top: 15px !important;}”][vc_btn title=”Contact Us Now” color=”danger” size=”lg” link=”url:%23contact-us”][/vc_column][/vc_row][/vc_section][vc_section css_animation=”none” css=”.vc_custom_1575621887487{padding-bottom: 60px !important;}” el_id=”overview”][vc_row][vc_column offset=”vc_hidden-sm vc_hidden-xs”][vc_widget_sidebar sidebar_id=”sidebar-5b8f8fdb9861f”][/vc_column][/vc_row][vc_row css=”.vc_custom_1575621899399{padding-top: 80px !important;}”][vc_column width=”1/6″][/vc_column][vc_column width=”2/3″][vc_custom_heading text=”overview” font_container=”tag:h6|font_size:10px|text_align:center|color:%23627792″ use_theme_fonts=”yes” el_class=”style1″][vc_empty_space height=”6px”][vc_custom_heading text=”What is Vulnerability Assessment & Penetration Testing?” font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][vc_empty_space height=”20px”][vc_column_text]

Vulnerability Assessment & Penetration Testing merupakan satu set asesmen untuk keamanan sistem TI yang dirancang untuk mengidentifikasi kerentanan sebuah sistem agar dapat melakukan mitigasi risiko celah kerentanan dieksploitasi dan diretas oleh pihak yang tidak bertanggung jawab.

Untuk memastikan anda memilih Asesmen yang tepat sesuai dengan kebutuhan perusahaan anda, penting untuk dipahami lebih dalam Proses Vulnerability Assessment & Penetration Testing, jenis-jenis Vulnerability Assessment & Penetration Testing, kedalaman penetrasi yang dibutuhkan, scope pengerjaan, serta alokasi budget untuk Offensive Security. Proses pemahaman terkait Offensive Security anda bisa mengatur untuk Meeting dengan Team Ahli kami.

[/vc_column_text][/vc_column][vc_column width=”1/6″][/vc_column][/vc_row][/vc_section][vc_section el_id=”benefits”][vc_row css=”.vc_custom_1647326391783{padding-top: 80px !important;padding-bottom: 50px !important;background-color: #eceff3 !important;}”][vc_column][vc_custom_heading text=”Benefits” font_container=”tag:h6|font_size:10px|text_align:center|color:%23627792″ use_theme_fonts=”yes” el_class=”style1″][vc_empty_space height=”6px”][vc_custom_heading text=”Vulnerability Assessment & Penetration Testing Benefit” font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][/vc_column][/vc_row][vc_row css=”.vc_custom_1646122783855{padding-bottom: 80px !important;background-color: #eceff3 !important;}”][vc_column][iconlist class=”custom-image gap-20″][iconlist_item type=”image” class=”aligncenter hover3″ icon_image=”1876″]

Identifikasi Kelemahan Sistem Anda

[/iconlist_item][iconlist_item type=”image” icon_image=”1881″ class=”aligncenter hover3″]

Menjaga Data Rahasia Perusahaan Anda

[/iconlist_item][iconlist_item type=”image” icon_image=”1882″ class=”aligncenter hover3″]

Melindungi Pelanggaran Data & Akses tidak Sah

[/iconlist_item][iconlist_item type=”image” icon_image=”1883″ class=”aligncenter hover3″]

Mendeteksi jalur masuk Serangan ke Sistem Anda

[/iconlist_item][iconlist_item type=”image” icon_image=”1884″ class=”aligncenter hover3″]

Kepatuhan Terhadap Peraturan Regulasi

[/iconlist_item][/iconlist][/vc_column][/vc_row][/vc_section][vc_section css_animation=”fadeInUp” css=”.vc_custom_1647326432672{padding-top: 80px !important;}” el_id=”ourservices”][vc_row][vc_column css_animation=”fadeIn” el_class=”delay-1″][vc_custom_heading text=”Our Services” font_container=”tag:h6|font_size:10px|text_align:center|color:%23627792″ use_theme_fonts=”yes” el_class=”style1″][vc_empty_space height=”6px”][vc_custom_heading text=”Our Services” font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][vc_empty_space height=”60px”][/vc_column][/vc_row][vc_row][vc_column css_animation=”fadeIn” width=”1/3″ el_class=”delay-1″][iconbox type=”image” tag=”h4″ text=”” icon_image=”1095″ title=”Mobile App Penetration Testing” class=”style3″]Evaluasi keamanan aplikasi mobile Anda, sesuai dengan TOP 10 Mobile Vulnerabilities oleh OWASP[/iconbox][vc_empty_space height=”30px”][/vc_column][vc_column css_animation=”fadeIn” width=”1/3″ el_class=”delay-2″][iconbox type=”image” tag=”h4″ text=”” icon_image=”1098″ title=”Website App Penetration Testing” class=”style3″]Evaluasi keamanan website Anda, sesuai dengan standar OWASP (Open Web Application Security Project)[/iconbox][vc_empty_space height=”30px”][/vc_column][vc_column css_animation=”fadeIn” width=”1/3″ el_class=”delay-3″][iconbox type=”image” tag=”h4″ text=”” icon_image=”1097″ title=”Managed Penetration Testing” class=”style3″]Menjaga dan menguji secara berkala sistem keamanan Informasi perusahaan Anda agar tetap terus terproteksi[/iconbox][vc_empty_space height=”30px”][/vc_column][/vc_row][vc_row css=”.vc_custom_1646122400120{padding-bottom: 80px !important;}”][vc_column][vc_btn title=”Contact Us Now” color=”danger” size=”lg” align=”center” css=”.vc_custom_1646139994909{padding-top: 20px !important;}”][/vc_column][/vc_row][/vc_section][vc_section el_id=”process” css=”.vc_custom_1647326449057{padding-top: 80px !important;padding-bottom: 80px !important;background-color: #eceff3 !important;}”][vc_row][vc_column][vc_custom_heading text=”Process” font_container=”tag:h6|font_size:10px|text_align:center|color:%23627792″ use_theme_fonts=”yes” el_class=”style1″][vc_empty_space height=”6px”][vc_custom_heading text=”Offensive Security Process” font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][vc_empty_space height=”60px”][/vc_column][/vc_row][vc_row][vc_column][iconlist][iconlist_item type=”image” css=”.vc_custom_1647331951205{border-top-width: 7px !important;border-top-color: #ff4b36 !important;border-top-style: solid !important;}”]

1. Gathering

Eksplorasi dan pengungkapan informasi tentang sistem yang dapat diakses serta layanan yang berjalan di dalamnya[/iconlist_item][iconlist_item type=”image” css=”.vc_custom_1647331783861{border-top-width: 7px !important;border-top-color: #ff4b36 !important;border-top-style: solid !important;}”]

2. Threat Modeling

Identifikasi kerentanan yang ada di sistem melalui pemindaian otomatis atau manual[/iconlist_item][iconlist_item type=”image” css=”.vc_custom_1647331959499{border-top-width: 7px !important;border-top-color: #ff4b36 !important;border-top-style: solid !important;}”]

3. Analysis

Proses dokumentasi dan analisis terkait dengan kerentanan yang ditemukan untuk eksploitasi/serangan berikutnya[/iconlist_item][iconlist_item type=”image” css=”.vc_custom_1647331799371{border-top-width: 7px !important;border-top-color: #ff4b36 !important;border-top-style: solid !important;}”]

4. Exploitation

Proses verifikasi kerentanan dengan meluncurkan teknik serangan yang dalam, untuk mendapatkan informasi berharga atau hak akses terbatas[/iconlist_item][iconlist_item type=”image” css=”.vc_custom_1647331806651{border-top-width: 7px !important;border-top-color: #ff4b36 !important;border-top-style: solid !important;}”]

5. Reporting

Dokumentasi aktivitas jaringan terbaik, temuan dengan bukti, penentuan tingkat risiko, dan rekomendasi yang berguna untuk perbaikan temuan pada sistem[/iconlist_item][/iconlist][/vc_column][/vc_row][/vc_section][vc_section css_animation=”fadeInUp” el_id=”ourstandars” css=”.vc_custom_1647326470461{padding-top: 80px !important;padding-bottom: 80px !important;}”][vc_row][vc_column][vc_custom_heading text=”Our Standards” font_container=”tag:h6|font_size:10px|text_align:center|color:%23627792″ use_theme_fonts=”yes” el_class=”style1″][vc_empty_space height=”6px”][vc_custom_heading text=”Our Standards” font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][/vc_column][/vc_row][vc_row css=”.vc_custom_1646120732856{padding-top: 40px !important;}”][vc_column width=”1/6″][ult_content_box][imagebox title=”ISO” image=”1826″][/imagebox][/ult_content_box][/vc_column][vc_column width=”1/6″][imagebox title=”PCI” image=”1827″]

Peripheral Component Interconnect

[/imagebox][/vc_column][vc_column width=”1/6″][imagebox title=”CIS” image=”1828″]

Center of Internet Security

[/imagebox][/vc_column][vc_column width=”1/6″][imagebox title=”OWASP” image=”1829″]

Open Web Application Security Project

[/imagebox][/vc_column][vc_column width=”1/6″][imagebox title=”OSSTMM” image=”1830″]

Open Source Security Testing Methodology Manual

[/imagebox][/vc_column][vc_column width=”1/6″][imagebox title=”ISSAF” image=”1831″]

Information Systems Security Assessment Framework

[/imagebox][/vc_column][/vc_row][/vc_section][vc_section css_animation=”fadeInUp” css=”.vc_custom_1646120967486{padding-bottom: 80px !important;}”][vc_row][vc_column][vc_separator css=”.vc_custom_1646121191501{padding-bottom: 80px !important;}”][vc_custom_heading text=”Our Security Expertise” font_container=”tag:h6|font_size:10px|text_align:center|color:%23627792″ use_theme_fonts=”yes” el_class=”style1″][vc_empty_space height=”6px”][vc_custom_heading text=”Our Security Expertise” font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][/vc_column][/vc_row][vc_row css=”.vc_custom_1646120493776{padding-top: 40px !important;padding-bottom: 40px !important;}”][vc_column width=”1/5″][ult_content_box][/ult_content_box][/vc_column][vc_column width=”1/5″][imagebox title=”CHFI” image=”1832″]

Computer Hacking Forensic Investigator

[/imagebox][/vc_column][vc_column width=”1/5″][imagebox title=”CEH” image=”1833″]

Certified Ethical Hacker

[/imagebox][/vc_column][vc_column width=”1/5″][imagebox title=”OSCP” image=”1834″]

Offensive Security Certified Professional

[/imagebox][/vc_column][vc_column width=”1/5″][/vc_column][/vc_row][/vc_section][vc_section css=”.vc_custom_1647326484286{padding-top: 80px !important;padding-bottom: 80px !important;background-color: #eceff3 !important;}” el_id=”client”][vc_row][vc_column][vc_custom_heading text=”Our Valueable Client” font_container=”tag:h6|font_size:10px|text_align:center|color:%23627792″ use_theme_fonts=”yes” el_class=”style1″][vc_empty_space height=”6px”][vc_custom_heading text=”Our Valueable Client” font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][vc_empty_space height=”30px”][/vc_column][/vc_row][vc_row][vc_column][vc_images_carousel images=”1868,1867,1866,1865,1864,1863,1862,1861,1860,1859,1858,1857,1856,1855,1854,1853,1852,1851″ img_size=”full” slides_per_view=”5″ autoplay=”yes” hide_pagination_control=”yes” wrap=”yes”][/vc_column][/vc_row][/vc_section][vc_row css=”.vc_custom_1648016558239{padding-top: 80px !important;}” el_id=”contact-us”][vc_column width=”1/2″ css=”.vc_custom_1648016780322{padding-top: 80px !important;padding-right: 40px !important;}”][vc_row_inner css=”.vc_custom_1646124959349{padding-right: 10% !important;padding-left: 10% !important;}”][/vc_row_inner][vc_custom_heading text=”Why choose us?” font_container=”tag:h3|font_size:26px|text_align:center” use_theme_fonts=”yes”][vc_empty_space height=”10px”][vc_column_text]

Proxsis Biztech dapat membantu meningkatkan digital transformasi perusahaan Anda dengan cara:

[/vc_column_text][vc_empty_space height=”50px”][vc_row_inner css=”.vc_custom_1646124959349{padding-right: 10% !important;padding-left: 10% !important;}”][/vc_row_inner][vc_row_inner content_placement=”middle” css=”.vc_custom_1648017038558{padding-top: 20px !important;padding-bottom: 40px !important;}”][vc_column_inner width=”1/4″][vc_single_image image=”1846″ img_size=”80×80″ alignment=”center” css_animation=”none”][/vc_column_inner][vc_column_inner width=”3/4″][vc_custom_heading text=”Optimalkan sistem TI” font_container=”tag:h5|text_align:left” use_theme_fonts=”yes” css=”.vc_custom_1646126977186{padding-bottom: 5px !important;}”][vc_column_text]Meningkatkan efisiensi serta menurunkan biaya & waktu[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner content_placement=”middle” css=”.vc_custom_1648017026230{padding-top: 20px !important;padding-bottom: 40px !important;}”][vc_column_inner width=”1/4″][vc_single_image image=”1847″ img_size=”80×80″ alignment=”center” css_animation=”none”][/vc_column_inner][vc_column_inner width=”3/4″][vc_custom_heading text=”End-to-end Solution” font_container=”tag:h5|text_align:left” use_theme_fonts=”yes” css=”.vc_custom_1646126964850{padding-bottom: 5px !important;}”][vc_column_text]Menyelaraskan proses sistem IT dari strategis hingga ke operasional[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner content_placement=”middle” css=”.vc_custom_1646132202418{padding-top: 20px !important;padding-bottom: 20px !important;}”][vc_column_inner width=”1/4″][vc_single_image image=”1848″ img_size=”80×80″ alignment=”center” css_animation=”none”][/vc_column_inner][vc_column_inner width=”3/4″][vc_custom_heading text=”Certified & Professional” font_container=”tag:h5|text_align:left” use_theme_fonts=”yes” css=”.vc_custom_1646127025386{padding-bottom: 5px !important;}”][vc_column_text]Tenaga ahli yang berpengalaman dan bersertifikat[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][vc_column width=”1/2″ css=”.vc_custom_1648016583522{padding-right: 0px !important;padding-left: 40px !important;}”][vc_raw_js]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[/vc_raw_js][/vc_column][/vc_row]