What We Do

PENTESTON provides a cloud-based security platform for our customers to conduct security assessments of their internet connected assets on demand. Our service will enumerate, identify and present data of potential exposures so that you can take proactive actions to prevent a cyber-attack. Our service is designed to meet or exceed the recommendations of the Open Web Application Security (OWASP) Top 10 and our findings are mapped to the Common Vulnerabilities and Exposures (CVE) that is a catalog of known security threats. The catalog is sponsored by the United States Department of Homeland Security (DHS), and threats are divided into two categories: vulnerabilities and exposures.

What We Do

Situation Reporting

Comprehensive Accurate Testing and Scanning using proven methodologies, techniques and technologies rapidly provide situational awareness

 

Cyber Due Care

Cyber risks are real and costly, and wise investors assess the health and safety of an enterprise before committing to a significant investment.

We Manage The Systems You Use The Tools

You simply log into our system using a web browser point and shoot. Don’t worry about dependencies and configurations. We have you covered. PENTESTON is a easy to use software-as-a-service.

FREE ACCOUNTS FOR Nonprofit Organizations

Nonprofit organizations of all types are being exploited and used as jump points for launching criminal activity against commercial businesses. To serve the community, we are pleased to offer our PENTESTON security assessment service FREE to registered non-profits. We believe that by allowing organizations that serve the community to find and fix internet-facing vulnerabilities we can help their missions. Details: Sign up for an account and we will approve it and remove the monthly charge upon verification of non-profit status. This is accomplished by uploading a copy of the organization's legal non-profit paperwork, and verification that the requester is an employee of the non-profit by use of the @domain.org address space in the email account. A valid credit card is part of the verification process, but will not be charged after verification. PENTESTON utilizes a verification site provided by the United States Internal Revenue Service to verify compliance with these terms. Visit: https://www.irs.gov/charities-non-profits/exempt-organizations-select-check to check if your organization is listed

Reports

With PENTESTON you have an opportunity to collect reports from various sources and tools and produce a single output.

Due Care

Reasonable steps taken in order to satisfy responsibilities and requirements to identify areas of technology risk to the business.

 

Recommendations

Daily synchronization of new detected vulnerabilities and giving recommendations about checked system

TOOLS

PRICING TABLE

Select one plan and start pentesting

  • $199 per month
    PREMIUM (15 DAY TRIAL)
  • UNLIMITED TARGET
  • UNLIMITED TEST
  • ABILITY SCAN SITE
  • ABILITY SCAN SINGLE IP
  • ABILITY SCAN RANGE OF IPS
  • UNLIMITED TOOL OR SCANNER FOR TEST PROJECT
  • REGISTER NOW

ONDEMAND VULNERABILITY ASSESSMENT PLATFORM

Today PENTESTON is a easy to use GUI that allows customers to enroll authorized targets and then schedule vulnerability assessments of their internet connected devices.


Sign in


Forgot password?



No account yet?


SIGN UP NOW

or

Sign in with Google Account

By clicking "Sign in with Google Account" you confirm that you agree to our Terms and Conditions

Contact Info

Proactive RISK Inc.
759 Bloomfield Ave., Suite 172
West Caldwell, New Jersey 07006
P: 1-888-255-0834 | Fax: 973-298-1160
Support system