FAQ

To best enable our clients we have created a list of the most Frequently Asked Questions.

General Questions

Do you offer a free trial?

Yes, yes, we do! Select the “Try Now!” option and follow through our guide to start using Pretect. It allows for one External Network or Web Application scan, then to view and use the Pretect platform.

How does the subscription work?

We create a tailored package based on your business needs and spread the cost of that over the agreed period of time. During that period, we will then be in contact with you to arrange the timing and execution of the services that you have requested.

Can I access Pretect at any time?

Yes, you can. Pretect is available 24 hours a day, 365 days a year through our secure web portal. From there, you can access your reports, graphs, and other services at your convenience.

Do I need to be an expert to use Pretect?

We’ve designed Pretect to be simple and intuitive for all users. From easy to navigate menus, to results graphs and multiple drill-down options to access the detail and data that you need.

How many users can I have on Pretect?

On average, we make provision for up to 5 registered users to access the Pretect system. However, we can always make an exception based on your subscription and business needs.

Can I upgrade/downgrade my package?

We can change your package at any time based on your business’s needs. Any outstanding or additional costs will be discussed and clarified before a new agreement is signed, all while the current package still continues as normal.

How long does a Penetration Test take?

The length of penetration tests depends on multiple variables and is a direct consequence of the number of assets involved and the complexity of the architecture. It is a hands-on process that requires time and patience – there are no short-cuts to achieving the best outcome. Our focused resources ensure they do everything in their power to penetrate an environment before it can be declared ‘secure’. We tend to see projects of one to two weeks, but projects can continue for weeks or even months.

Technical Questions

What is the difference between a Penetration Test and a Vulnerability Scan?

A vulnerability scanis an automated process that scans your systems looking for potential known vulnerabilities and is usually the first step performed by penetration testers.
Penetration testing is a manual process performed by a cyber security professional, applying human creativity to exploit potential logic flaws in the system and uncover weaknesses.

Is there an international standard for Penetration Testing?

There are many international standards, and Magix follows the National Institute of Standards and Technology (NIST) article 800. This is a respected and well recognized Cybersecurity Framework that assembles standards, guidelines and practices that have proven to be effective. Many organizations use this framework to develop, maintain and modify their own cyber security programs.

Are there different levels or methods of Penetration Testing?

There are different levels, or boxes, which cover the methods andintent behind the testing. These include, but not limited to:

Black Box
Penetration testers are placed in the role of the average hacker,with no internal knowledge of the client’s system. A black-box penetration test determines the vulnerabilities in a system that are exploitable from outside the network and involves a longer timeframe for information gathering andtesting.

Grey Box
This is the next step up from black-box testing. If a black-boxtester is examining a system from an outsider’s perspective, a grey-box tester has the access and knowledge levels of a user, with the potential to elevate privileges on a system.

White Box
Also called clear-box, open-box, auxiliary and logic-driventesting. It falls on the opposite from black-box testing: penetration testers are given full access to source code, architecture documentation, and so forth. This simulates an attacker already bypassing various protections and controls in place.

I don’t need to be PCI-DSS compliant, why should I perform a Penetration Test?

Penetration testing is more than “ticking a box” for compliance, it’s about testing and uncovering weaknesses in your IT infrastructure. This, in conjunction with vulnerability scanning, can tighten the overall security posture and lessen the chances of being breached.

How much does a Penetration test cost?

The prices of a Penetration test can change depending on the type and method required. We at Magix do provide competitive pricing based on your requirements and budget, while still ensuring thoroughness and quality behind the work.

Are Vulnerability Scans disruptive to my network?

Although there is an increase in network traffic during a scan, your network performance and stability will not be affected during this process. The average user will not even realise that a scan is taking place!

Will a Penetration Test bring down my network or server?

Before engaging in the Penetration Test, we will discuss the rules of engagement to outline the “do’s and don’ts” of the test. Should a particular exploit or vulnerability be found that could lead to a loss of productivity, we will first make contact and discuss the steps forward on the testing process.

Contact us