Services
Penetration Testing
Pen testing is a method used to determine whether vulnerabilities actually exist, exist only in theory or to prove your mitigation strategies are working. Our method of pen testing on IBM i differs from network pen tests. Our goal is to determine whether vulnerabilities exist in IBM i configuration settings. In other words, we test to determine whether we can elevate user privileges, gain access to the system via mis-configured user profiles, download critical IBM i database files and more. If your requirement is to ensure your data has been secured adequately, we’ll work with you to attempt to access specific files to help you assess whether your approach to securing your data is working. Our final report will provide you with the information you need to prioritize changes to your IBM i security implementation that will help protect your data going forward.