A natural follow up to a vulnerability assessment, the penetration (Pen) test goes the next step to actively exploit those vulnerabilities in order to expose real-world attack vectors against an organization’s IT assets, data and employees. There are two distinct ways to deploy Pen Testing against your organization’s information assets. Janus Systems Corporation offers White-box Pen Testing where you provide us with network knowledge and access so that we may explore internal networks for “ways in” that you were not aware existed through deficiencies in security settings or protocols. In Black-box Pen testing, we are provided minimal network knowledge and access and are tasked with “breaking in” to your network resources from scratch, the way a cyber criminal bad actor would. Janus Systems Corporation will consult with your IT management to ascertain the right program for your organization based on type and value of your data assets, budget, and timeframes.