Cybersecurity Services

Run advanced engagements with the Cobalt Cybersecurity Services team.

Cybersecurity Services provide security testing solutions beyond pentesting. Our focus on process execution allows for faster engagements with a centralized view into the health of security programs and a clear path for elevated security posture.

Need an Advanced Pentest? Contact Us »

Pentest Engagements

The Cobalt Cybersecurity Services team can run the following pentest engagements:

  • IoT ecosystem pentest
  • Secure code review
  • Vulnerability validation
  • Goal-based pentest
  • Threat modeling
  • Red teaming
  • Thick client application pentest
  • Wireless network pentest
  • Physical social engineering
  • Electronic social engineering
  • Security hardening
  • Pentest program management

Can’t find what you need? Contact us to plan an engagement tailored to your needs.

Pentest Process

Lifecycle of the Cobalt pentest program

Here are the stages of a Cybersecurity Service engagement:

Stage Description
1 Discover You define what you need to test and request the service in the platform or contact your CSM.
2 Plan We arrange a kickoff call to plan, scope, and schedule the service. During this stage, we:
  • Determine the scope, including the engagement type and methodology.
  • Create a Statement of Work.
  • Set timelines.
3 Test The Cobalt Cybersecurity Services team tests your asset using the determined methodology.
  • We share vulnerabilities that we discover in real time, in a dedicated Slack channel.
  • At this stage, you can start remediating findings.
4 Remediate The testing process is complete. Remediate discovered findings.
  • We provide remediation guidance during testing.
  • We don’t provide free retesting for Cybersecurity Services.
5 Report We share a report once the engagement is complete.
  • For advanced pentests, the report sections may differ compared to standard pentests.
  • We also offer a debrief call where you can ask questions about the remediation, report, and testing performed.
6 Analyze Once the engagement is complete, analyze the security posture of your asset.
  • Deep dive into the report to assess discovered vulnerabilities with your development and security teams.
  • Take the required remediation actions.

Asset Types

Cybersecurity Services supports additional asset types, beyond our standard pentest asset types. You may see these asset types in the Cobalt UI:

Asset Type Description
IoT An IoT ecosystem. As defined by NIST, an IoT device has at least one transducer (sensor or actuator) for interacting directly with the physical world and at least one network interface, such as Ethernet, Wi-Fi, or Bluetooth, for interfacing with the digital world.
Physical An office, building, campus, or a physical device.
Thick Client An application installed locally on a user’s computer.
Wireless Network A network that allows devices to stay connected without using wires of any kind.
Other Asset used in other engagements, such as phishing, red teaming, security hardening, and more.

How to Request Cybersecurity Services

Specialized pentest in the Cobalt UI

To request a Cybersecurity Service, navigate to the Services tab in the Cobalt UI. Select the services you’re interested in and select ‘Request Service’.

Our CSM team will reach out to start the process at a time that suits you.





Was this page helpful?

Yes No Create an Issue

Last modified November.11.2023