Spirent SecurityLabs

Spirent SecurityLabs的服务采用了旨在产生影响深远的结果,并且将对客户机构造成的影响降至最低。我们的专业团队由经验丰富的安全专家组成,为网络、无线、网站、移动应用、嵌入式设备提供全面的扫瞄、贯穿式测试、监视服务,以及源代码分析。

查看产品资料 →

Breaching the External Network Security Perimeter

On-Demand Webinar

Network security device vendors are stepping up and doing a decent job at preventing external attacks on your network infrastructure but attackers are always looking for innovative ways of breaking in. In this on-demand webinar, we will explore various techniques to walk around such protections and gain access to the internal network as an outsider with access to nothing but Internet.

White Paper

This paper discusses the technical details involved with open-source intelligence gathering and using that intelligence to penetrate an organization’s perimeter and gain access to the internal network. We will also describe several protection mechanisms that organizations can implement to protect themselves against such attacks.


Networks and wireless

In depth testing of your networks to uncover exploitable vulnerabilities, including insecure server/firewall configuration, unpatched servers with known vulnerabilities, rogue access points, eavesdropping, information leakage and improper error handling.

Wireless testing includes checking wireless access points in range, presence of rogue devices, physical access to the wireless, weak encryption usage and security of the access points connected to the wired network.

Web and mobile applications

Scalable testing from OWASP Top 10 to comprehensive penetration testing of mission critical applications ensuring all applications within your organization are routinely tested for risk to evolving threats.

For mobile applications we also test binary code, related web services and http(s) communication for dynamic analysis and device end security.

Devices

Comprehensive testing of devices including those used for networking, connected vehicles, and various IoT uses including monitoring, supply chain, facility management, and manufacturing process.

We assess the device firmware, binary code, related web services and http(s) communication for exploitable vulnerabilities, discover and exploit underlying web application for security weaknesses such as authentication bypass, authorization boundary, CSRF & XSS in Embedded Web Application Servers and many others.

源代码分析

有些安全漏洞在代码完成汇编后便很难被识别。利用我们的代码审查服务,将可以突出显示可能的漏洞,例如缓存溢出、SQL注入缺陷、后门、验证旁路和授权边界。利用“静态”(非运行)源代码分析中被称为污染分析和数据流等技术,我们将帮助您将安全性贯彻到整个开发生命周期中。

安全应用、网络和设备的重要性
超过以往任何时候

今天,经过仔细伪装并以数字代码形式呈现的想法成功地绕过了许多企业和国家的安全防线。而在商业世界中,经过仔细伪装的代码包也在不断穿透企业的层层防线,并从中窃取敏感的商业和用户数据。这些攻击会损害价值数十亿美元的全球品牌花费数十年构建起来的公信力和声誉。

设计精巧的分层式网络安全性仍然能够遏制很多漏洞,但要想发现这些漏洞并开发出制止它们的新方法,需要的是创造性的思维和人类持久的智慧。

这便是贯穿测试人员的使命。

这种基于道德的黑客攻击作法可以揭露您企业中的安全弱点和数字风险,防止他人在不经意或心怀恶意的情况下对其加以利用。

下载白皮书→

Connected Vehicle Resources

On-Demand Webinar

Learn about the growing threat landscape for connected vehicles as they incorporate more “smart” features to become increasingly connected with outside services and how to better secure critical systems.

Watch now →

Securing the Connected Vehicle

Preventing, detecting, and remediating cyber-attacks have been an important security concerns for the technology industry. But as the new world of connected devices converge, the personal vehicle has become a target.

Download white paper →

Spirent Automotive Solutions

With Spirent, you can test, refine, and optimize all aspects of in-car, V2V, and V2X connectivity to provide the experiences that modern drivers and passengers demand.

Learn more →

还在为找不到适合自己业务的产品而发愁吗?

联系我们 →