Contact Us

Use the form on the right to contact us.

You can edit the text in this area, and change where the contact form on the right submits to, by entering edit mode using the modes on the bottom right. 

         

123 Street Avenue, City Town, 99999

(123) 555-6789

email@address.com

 

You can set your address, phone number, email and site description in the settings tab.
Link to read me page with more information.

CrmAPXIUMAACxkD.jpg

Vulnerability and risk analysis

Vulnerability and risk analysis

Rapid, expert penetration testing with prioritized, actionable reports

Perspecta Labs’ vulnerability and risk analysis consulting services validate security architecture and controls, discover previously unknown security weaknesses, and enable our customers in the utilities, energy, transportation, entertainment, financial services and healthcare sectors to better manage cybersecurity as a business risk. We deliver fast, affordable and actionable risk ratings and mitigation steps with full-coverage of people, processes, technology and data. Our multidisciplinary teams of security consultants and engineers comprise of highly-skilled, professionally-certified and customer-focused experts.  

Perspecta Labs uses its proven 4-Quadrant Security Assessment Methodology to perform vulnerability assessments and penetration testing across enterprise networks, communications systems, utility and smart energy systems, industrial control systems, IPTV and protected content systems. Spanning information technology and operations technology, our risk and business impact analyses identify vulnerabilities and exploits, and provide practical mitigations across design, implementation and configuration.

Perspecta Labs offerings include:

  • Software and OWASP Web vulnerability assessment

  • Network penetration testing, firewall and DMZ assessments

  • Embedded hardware integrity analysis and reverse engineering

  • Wireless security analysis and injection

  • Smartphone and IoT application assessment

  • Cloud infrastructure assessment

  • Source code reviews

  • “Black Box” and “White Box” testing

  • Infrastructure external exposure analysis