Once the engagement commences, we establish a real-time communication conduit between the customer and our team members to ensure seamless connection. This channel remains indefinitely open, with our availability extended for any inquiries or concerns the customer may have regarding the findings or the penetration testing engagement as a whole.
At the client's request, we can encrypt the penetration testing report and securely dispose of all engagement results from our end, rendering them irretrievable. This additional measure enhances safety and security for our customers.
Any critical security vulnerabilities identified during our security assessment are promptly reported to the client via an initial report through our established communication channel or any other secure method preferred by the client.
Upon the customer resolving any findings from our report, we conduct patch verification of the deployed fix on the same day we receive their request, at no additional cost or fees.
We opt not to conduct our penetration tests on the customer's production environment. Instead, we prioritize similar practices to minimize disruptions to business serviceability. All our tests are carried out on dedicated environments previously prepared by the client, such as prelive or staging environments.
Our penetration testing report provides customized solutions for addressing each vulnerability identified.