![](https://cdn.prod.website-files.com/62434fa732124a0fb112aab4/62434fa732124a55c612aae2_portfolio%202%20-%20wide.svg)
Mobile App Pentests
A mobile application pentest is the process of approaching a native or mobile application whether that is iOS or Android, and finding vulnerabilities that would be utilized by a hacker to harm the application with malicious intent.
![](https://cdn.prod.website-files.com/62434fa732124a0fb112aab4/62434fa732124a55c612aae2_portfolio%202%20-%20wide.svg)
Web Application Pentest
A web application pentest is a type of pentest where the target is an application running, usually, behind an authentication mechanism (like a login).
![](https://cdn.prod.website-files.com/62434fa732124a0fb112aab4/62434fa732124a55c612aae2_portfolio%202%20-%20wide.svg)
Cloud Pentest
A cloud pentest assesses the security of your Cloud Infrastructure to ensure that if a hacker were to approach the environment, there would be no vulnerabilities they could utilize for malicious intent. This could take place in AWS, Azure, GCP, M365, Digital Ocean, and more.
![](https://cdn.prod.website-files.com/62434fa732124a0fb112aab4/62434fa732124a55c612aae2_portfolio%202%20-%20wide.svg)
External Pentest
An external pentest tests the security of the publicly facing assets of a company in order to ensure that if a hacker were to approach, they would not be able to leverage any vulnerabilities for an attack.
![](https://cdn.prod.website-files.com/62434fa732124a0fb112aab4/62434fa732124a55c612aae2_portfolio%202%20-%20wide.svg)
Internal Pentest
Internal pentests test the security of your company's internal network through a VPN and active directory.
![](https://cdn.prod.website-files.com/62434fa732124a0fb112aab4/62434fa732124a55c612aae2_portfolio%202%20-%20wide.svg)
Ready for a pentest?
Talk with us to learn more about our pentesting capabilities and competitive pricing.