In this assessment, we will work with you to create a scope of devices, services, and networks you would like to have looked at. We will then, together, decide an initial access point and set goals for the test. These goals can be accounts, servers, data, or anything else you decide is important to your organization. From there, we will start our penetration test using top of the line industry tools and custom-written code to discover weaknesses and exploit them to get access to your set goals. Finally, we will create our findings documentation, as well as remediation suggestions based on our discoveries, and present them to you and your team.