vpentest-msp-info
vpentest-msp-info
Table of Contents
03 EXECUTIVE SUMMARY
04 WHAT IS vPENTEST
07 SCHEDULING FLEXIBILITY
EXECUTIVE SUMMARY
A Managed Service Provider (MSP) is the these services unfeasible. This is due to
lifeline of many organizations around the the level of manual effort required to
globe, ranging from small and medium- fulfill these services, which typically take
sized businesses (SMBs) to even some several days, hacking skills, and require
larger organizations. For many decades, a lot of interaction with the customer.
organizations have relied on MSPs to Many larger organizations have the
enable their businesses to operate and budget and capabilities to have these
conduct business. This includes installation services fulfill; however, SMBs typically
of physical network hardware and have to figure it out themselves until
software needed to operate, as well as the they are large enough to afford such
on-going support and maintenance. assistance.
The demand for IT services have Vonahi Security intends to partner with
significantly increased over the last decade, MSPs to solve this long-lasting and
thus many MSPs have entered the market. continually growing challenge with the
However, one of the challenges that are introduction of an automated solution
faced by MSPs is fulfilling the need of that is efficient, competitive, affordable,
customers who need comprehensive and scalable without limitations. By
cybersecurity services. Currently, MSPs providing an automated solution to
have the ability to provide automated solve this challenge, MSPs can provide
vulnerability scanning, but this is the this service to their customers to
limitation; additional services require compliment IT services. By partnering
outsourcing. with Vonahi Security, MSPs will have
the ability to offer more value than
Although cyber security services are critical traditional cybersecurity consulting
for SMBs due to the high risk of a data companies, and on a much larger scale.
breach and going out of business, the cost
of cyber security services make providing
FOR MANAGED SERVICE PROVIDERS 4
WHAT IS vPENTEST?
vPenTest is an automated network penetration testing
platform that replicates the exact same steps and
processes performed by a security consultant. This
includes technical tasks such as host discovery, service
enumeration, vulnerability analysis, exploitation, post-
exploitation, privilege escalation and lateral movement,
as well as documentation and reporting.
ADVANTAGES OF vPENTEST TO
TRADITIONAL PENETRATION TESTING
Traditional penetration testing has come a long way in the world of offensive cyber security
services; however, there are limitations that even many cyber security consulting firms face.
This includes some of the following issues:
03. 06.
FULFILLING A COSTLY AND
HIGH DEMAND OF TIME-CONSUMING
SERVICES ENGAGEMENTS
Additionally, since vPenTest provides activity logs to help customers identify where detection
and response gaps may exist, this allows MSPs to sell additional services to their customers,
such as network firewalls, intrusion detection and response systems (IDS/IPs), and more.
FOR MANAGED SERVICE PROVIDERS 7
SCHEDULING FLEXIBILITY
vPenTest gives
you the ability to
assign modules
to customers
based on IPs and
schedule flexibility.
FOR MANAGED SERVICE PROVIDERS 8
Traditional penetration tests are extremely time consuming, whereas vPenTest can
run numerous tools simultaneously, wait for them to complete, automatically analyze
the results, and determine its next move. This saves a significant amount of time from
simply running one command at a time. Furthermore, vPenTest reduces the time
spent reporting from 6 hours (average between reporting, QA, etc.) to less than a
minute. That’s a 29,900% speed increase per assessment that it saves.
Customers that log into vPenTest can submit a support ticket, which will be generated
and sent to primary points of contacts at the MSP. If the issue cannot be resolved
by the MSP, the MSP has the ability within vPenTest to escalate the ticket to Vonahi
Security. At this point, Vonahi Security will work with the MSP or the customers on the
requested support.
05. Is vPenTest geared more towards web app pen tests or network
system pentest?
Exploitation & Post Exploitation: Including uploading files that would provide
access via a shell, enumerating AD group memberships to look for elevated
access, enumerating shares, etc.
FOR MANAGED SERVICE PROVIDERS 10
vPenTest does not currently map to any compliance frameworks. We’ve started
developing some PCI-oriented configurations around the platform (e.g. performing
segmentation testing and validation), but these changes are going to be pushed out
in a future release.
09. When the report is completed, do the results stay in the portal?
Where is the data stored?
Upon completion of the projects, the data within the portal is destroyed within one
month unless specifically requested not to.
10. If a hacker gets in, can they see all your clients from one
single login?
Only a small number of Vonahi Security employees (less than 3) have access to the
portal and all of the client information. These accounts are protected with extremely
long credentials and multi-factor authentication. The application also consists of
several honeypots to lure malicious attackers and has a zero tolerance hack attempt -
any malicious attempt between vPenTest agents or even the vPenTest portal results in
an immediate and permanent IP ban.
12. If I scan an entire subnet range, will the whole range count against
my IP address limit?
No. If you provide a /24, for example, and there are only 5 live systems within that
network, then your IP address count will only be reduced by 5.
vPenTest does not consider the range, or location(s) included in the assessment
when it comes to the IP address count. The only thing that matters is the number of
systems that are actually active within the environment.
While many individuals may believe that excluding devices such as printers may be
necessary to preserve IP addresses, it should be noted that any device on a network
could present a risk to the environment.
FOR MANAGED SERVICE PROVIDERS 12
Scheduling assessments
Execute penetration tests
may be difficult, depending
at any time, any day
on available resources
ABOUT US
Vonahi Security is building the future of
offensive cyber security consulting services
through automation. We provide the
world’s first and only automated network
penetration test that replicates full attack
simulations with zero configuration.
With over 30 years of combined industry
experience in both offensive and
defensive security operations, our team
of certified consultants have experience
working with a significant number of
organizations, industries, networks,
and technologies. Vonahi Security is
headquartered in Atlanta, GA.
www.vonahi.io
HERE TO HELP!
Questions, concerns, or
feedback? Our team is
ready to assist.
[email protected]
FOR MANAGED SERVICE PROVIDERS 15
HELLO WORLD.
MEET MODERN
SECURITY.
ww w.vonahi.io
1. 844.VONASEC (866-2732)
@vonahisec