Cybersecurity Services
Cybersecurity Services provide security testing solutions beyond pentesting. Our focus on process execution allows for faster engagements with a centralized view into the health of security programs and a clear path for elevated security posture.
Need an Advanced Pentest? Contact Us »
Pentest Engagements
The Cobalt Cybersecurity Services team can run the following pentest engagements:
- IoT ecosystem pentest
- Secure code review
- Vulnerability validation
- Goal-based pentest
- Threat modeling
- Red teaming
- Thick client application pentest
- Wireless network pentest
- Physical social engineering
- Electronic social engineering
- Security hardening
- Pentest program management
Can’t find what you need? Contact us to plan an engagement tailored to your needs.
Pentest Process
Here are the stages of a Cybersecurity Service engagement:
Stage | Description | |
---|---|---|
1 | Discover | You define what you need to test and request the service in the platform or contact your CSM. |
2 | Plan | We arrange a kickoff call to plan, scope, and schedule the service. During this stage, we:
|
3 | Test | The Cobalt Cybersecurity Services team tests your asset using the determined methodology.
|
4 | Remediate | The testing process is complete. Remediate discovered findings.
|
5 | Report | We share a report once the engagement is complete.
|
6 | Analyze | Once the engagement is complete, analyze the security posture of your asset.
|
Asset Types
Cybersecurity Services supports additional asset types, beyond our standard pentest asset types. You may see these asset types in the Cobalt UI:
Asset Type | Description |
---|---|
IoT | An IoT ecosystem. As defined by NIST, an IoT device has at least one transducer (sensor or actuator) for interacting directly with the physical world and at least one network interface, such as Ethernet, Wi-Fi, or Bluetooth, for interfacing with the digital world. |
Physical | An office, building, campus, or a physical device. |
Thick Client | An application installed locally on a user’s computer. |
Wireless Network | A network that allows devices to stay connected without using wires of any kind. |
Other | Asset used in other engagements, such as phishing, red teaming, security hardening, and more. |
How to Request Cybersecurity Services
To request a Cybersecurity Service, navigate to the Services tab in the Cobalt UI. Select the services you’re interested in and select ‘Request Service’.
Our CSM team will reach out to start the process at a time that suits you.
Last modified November.11.2023