The following information sets out NT-ware’s process and methodology as a basic standard for any security and PEN testing organizations we engage to test our product. Any external testing organization must follow privacy, security and confidentiality agreements.
Security controls
To maximize coverage and ensure that we detect all high-risk vulnerabilities, our testing process includes the following security controls:
Security assessment process
Security assessments follow key stages but, as project requirements and tests are unique to each project, the penetration testing process is invariably adjusted to fit the project’s needs.
Information gathering
Planning and analysis
Vulnerability detection
Vulnerability exploitation
Reporting stage
Report development stage
Risk calculation
Our  risk rating is based on the OWASP risk  rating methodology. The  likelihood and impact of findings are  categorized as LOW, MEDIUM or  HIGH on a scale of 0 to 9. These metrics  are then calculated to provide  an overall severity rating.
back