A Akamai gravará esta transcrição. Consulte a nossa política de privacidade para obter mais informações. Ao prosseguir, você concorda com a gravação e o uso de seus dados pessoais.
Network penetration testing is used by organizations to evaluate the susceptibility of information systems to network attacks. By identifying and actually exploiting the weaknesses found in networks, hosts, and devices, penetration testing goes beyond simple vulnerability assessment. Rather than providing a lengthy list of issues an organization may or may not choose to address, network penetration testing helps enterprises grasp the real level of risk posed by specific vulnerabilities.
Presenting companies with a detailed vulnerability report and recommendations for improvement, network penetration testing enables IT departments to validate existing security controls and meet security compliance requirements while allowing managers to better prioritize investment for remediation efforts.
Network Penetration Testing: The Process and Its Limits
Emulating a real-world attack on an organization's network, the network penetration testing process consists of:
Although network penetration testing is one way of proactively determining actionable items for improving an organization's security posture, it is not an exact science. The results of a penetration test may vary depending on its scope and time frame as well as the abilities of individual testers. Penetration testers will not have access to the same resources criminal hackers do—be it time, cohorts or attack tools. Moreover, penetration testing is costly and when poorly implemented, may result in network congestion, server outages, and system instability.
Always-On Defense-in-Depth: Cloud Security Solutions from Akamai
While network penetration testing is a useful vulnerability management tool, it cannot guarantee the security and continued performance and availability of an organization's websites and applications in an ever-evolving threat landscape, particularly in the face of massive-scale DDoS attacks. Only a globally distributed, instantaneously scalable cloud-based security platform can do that.
Built on the globe-spanning Akamai Intelligent Platform, Akamai's Cloud Security Solutions offer our customers an always-on, in-depth approach to defense: