IS YOUR IT INFRASTRUCTURE SECURE?

Vulnerability assessment tools are an essential part of enterprise security strategies, as scanning applications and network for known vulnerabilities is a key best practice.

The VAS tool is running on an industrial mini PC sets in your network for internal audit, or outside the network for external audit. It continuously running to find out gaps in your infrastructure. It scans against latest daily updated SecInfo database, current:

 
Call us now for 2 Days network assessment. The tool can cover up to 500 IPs (effective number depends on scan pattern and scanned systems).

Hacker

We can perform various types of penetration testing Services such as White, Black or Grey Box testing.

Vulnerability Assessment and Penetration Testing Services

  1. Network Penetration Testing Services
  2. Social Engineering Testing Services
  3. Web Application Penetration Testing Services
  4. Application Penetration Testing Services

Network Penetration Testing Services

  • Penetration testing from both inside and outside of Client’s network
  • Identify targets and map attack vectors (i.e., threat modelling)
  • Internet Protocol (“IP”) address mapping of network devices
  • Transmission Control Protocol (“TCP”) scanning, connect scan, SYN scan, RST scan, User Datagram
    Protocol (“UDP”) scan, Internet Control Message Protocol (“ICMP”) scan, and Remote Procedure Call
    (“RPC”) port scan
  • Operating System (“OS”) fingerprinting (OS fingerprinting is the combination of passive research and
    active scanning tools to generate an accurate network map)
  • Banner grabbing
  • Brute force attacks
  • Denial of Service (“DDoS”) testing
  • Network sniffing
  • Spoofing
  • Trojan attacks; and War dialing

Social Engineering Testing Services

  • Pretexting
  • Phishing campaigns (e.g., email, phone)
  • Physical tests (e.g., tailgating, entry into controlled facility areas).

Web Application Penetration Testing Services

  • Injection
  • Broken Authentication and Session Management
  • Cross Site Scripting (“XSS”)
  • Insecure direct object references
  • Security misconfiguration
  • Sensitive data exposure
  • Missing function level access control
  • Cross Site Request Forgery (“CSRF”)
  • Using components with known vulnerabilities
  • Unvalidated redirects and forwards

 

In order to get approval for performing in depth security scans targeting sites or services you need to complete the following form and submit it back to our security team. 

Please fill out the form below and we will contact you shortly.

Testing is not authorized until I0T Inc. validates the information and sends an authorization email to the requesting party containing an authorization number. Authorization can take up to 48 business hours.


Please prove you are human by selecting the Car.

 

I0T Inc. Penetration Testing Terms and Conditions

1. DEFINITIONS

1.1.“Company” means I0T Inc.

1.2. “Client” means the individual(s) and/or Organization(s) to whom the Company is providing Security Testing and who has signed and completed a Penetration Test Authorization Form;

1.3. “Penetration Test Authorization Form” means the Company’s form to be signed by the Client and submitted to Company when ordering the Security Testing;

1.4. “Conditions” means the terms and conditions set out in this Contract;

1.5. “Confidential Information” means all tangible and intangible information designated as confidential by any party in writing together with all other information which may reasonably be regarded as confidential including, but not limited to, details of the Clients’ System, procedures, network configuration and topology, passwords, private encryption keys and details of the Company’s methodologies;

1.6. “Consultant” means the individual(s) provided by Company for the performance of the Security Testing;

1.7. “Contract” means the contract formed by these Terms and Conditions together with the Proposal and the Penetration Test Authorization Form;

1.8. “Fees” means Company’s fees for the Security Testing as detailed in the Proposal, and all reasonable expenses incurred by the Consultant in carrying out the Security Testing which will be agreed in advance with the Client;

1.9. “Intellectual Property Rights” (IPR) means any copyright, patent, design patent, registered design and design rights, utility models, trademarks, service marks, an application for any of these or the right to supply for the same, trade secrets, know-how, database rights, moral rights, confidential information, trade or business names and any other industrial and proprietary and other similar protected rights in any country and any licences under or in respect of such rights;

1.10. “Party” means any party to, or the parties to, this Contract;

1.11. “Personal Data” has the meaning given to that term in Data Protection Laws;

1.12. “Proposal” means the proposal for the Security Testing provided by Company to the Client detailing the scope of work all or some of which may be accepted by the Client in their purchase order;

1.13. “Security Testing” means the process of testing the System as described in the Proposal made by the Company to the Client;

1.14. “Start Date” means the date the Security Testing will start to be provided as confirmed by the Company in writing to the Client;

1.15. “System, Server or Website” means the systems and networks which the Client requires to be security tested pursuant to this Contract;

1.16. “Test Report” means the report produced by the Company detailing the results of the Security Testing;

 

2. COMPANY’S DUTIES

2.1. The Company shall perform the Security Testing for the Client using reasonable skill and care and in a professional, timely manner. Time for provision or completion of the Security Testing or any part of it shall not be of the essence.

2.2. Where a Test Report is required it shall, unless otherwise agreed, be produced by the Consultant within ten (10) working days or as agreed with the Client on completion of the Security Testing and sent to the Client.

2.3. Whilst the Company will use reasonable endeavours to ensure that the same Consultant will continue throughout the Security Testing, it reserves the right to replace that Consultant if necessary at its reasonable discretion by notifying the Client.

2.4. The Company shall, where the Consultant is present on the Client’s premises, ensure that the Consultant complies with such reasonable site rules and procedures as are prior notified to the Company.

3. THE CLIENT AGREES

3.1. To obtain appropriate consent from its ISP (Internet Service Provider), only where the ISP is hosting services on behalf of the Client and any other relevant third party supplier of the System, only where the third party supplier is hosting services on behalf of the Client for the Security Testing to be carried out and, when requested by the Company, to provide evidence of such consent and to notify relevant employees that the Security Testing has been scheduled and that they may be monitored;

3.2. To arrange a mutually convenient time with the Company for the performance of the Security Testing and to inform its ISP of the date agreed with Company in accordance 3.1;

3.3. To make appropriate backups of the System prior to the commencement of the Security Testing;

3.4. That, where the Security Testing is to take place on the Client’s premises, the Client shall ensure that suitable accommodation is provided for the Consultant which shall include network access and, where necessary, access to data centres, server rooms and/or switch rooms;

3.5. That should the Client require a laptop or Personal Digital Assistant (PDA) to be security tested by the Company it will deliver the laptop and/or PDA to the Company’s registered address and collect it from those premises or authorize other means of delivery and return at the Client’s own risk. The Company shall not be liable for the laptop or PDA during transit to or from its offices;

3.6. The Client will compensate the Company for any direct losses incurred as a result of a claim from a third party arising out of any failure of the Client to comply with clauses 3.1, 3.2 and 3.3 provided always that the Company shall mitigate any and all losses and provide written notice of any claim to the Client within 10 working days;

3.7. To provide the Company with at least one employee who shall have substantial computer systems, network and project management experience of the Client’s Systems to act as liaison between the Client and the Company;

3.8. To co-operate with the Company and to provide it promptly with such information about its Systems, network, premises, equipment, data structures, protocols, software, hardware and firmware as are reasonably required by the Company;

3.9. To ensure that, where the Security Testing is taking place on its premises, the premises are safe;

3.10. That, by signing the Penetration Test Authorization Form, the Client consents, for itself and on behalf of all group companies, to the Company performing the Security Testing and that it has procured, where necessary, the consent of all its (and its group companies) employees, agents and sub-contractors that the Company shall be permitted to carry out the Security Testing. The Company will be carrying out the Security Testing in the belief that it has all appropriate consents, permits and permissions from the Client and its group companies (and their employees, agent and sub-contractors);

3.11. That, whilst the Company will conduct all Security Testing in line with accepted best practice and make all reasonable efforts to avoid disruption of the Client’s network, the tools and techniques used may cause disruption to the Client’s Systems and/or possible loss of or corruption to data and the Client agrees to take such backups and provide such redundant systems as are prudent in the circumstances. The Company will notify the Client in the event where activity would lead to loss of service or data before proceeding where this is known to the Company;

3.12. To notify the Company immediately if there are any periods during Security Testing when the Company should stop work due to critical business processes (such as batch runs) or if any part of the System is business critical so that the Company can, if needs be and with the Client’s consent, modify its testing approach;

3.13. That, where the Company supplies any software as part of the Security Testing, it shall only use such software for lawful purposes;

3.14. That, during the performance of the Security Testing and for a period of 6 months after completion of the Security Testing, it will not recruit any employees or personnel of the Company which it met or was introduced to through its relationship under this Contract without the prior written consent of the Company;

4. FEES AND PAYMENT

4.1. The Fees payable under this Contract shall be invoiced on delivery of the Test Report or, if none is to be provided, on completion of the Security Testing. Invoices are due for payment within 30 days of the date of the invoice. All payments due under this Contract shall become due immediately upon termination of this Contract despite any other provision in this Contract. All payments due under this Contract shall be made without any deduction by way of set off, counterclaim, discount or abatement or otherwise.

4.2. Upon confirmation by the Company in writing to the Client of the Start Date, the Company will immediately start to allocate resources and facilities and commit to third party expenditure to fulfil its contractual commitments. The Company may at its absolute discretion allow the Security Testing to be re-scheduled or cancelled, but if it does so allow, the Client agrees that it will be committed to paying the Company a proportion of the Fees as genuinely pre-estimated liquidated damages to reflect the losses which it will incur as a result of such cancellation or re-scheduling, as follows:

4.2.1. cancellation or re-schedule request within 48 hours of the start date and where the Company is unable to utilize the committed resources 20% of the Fees will be payable; and

4.5.2. this applies to each delay separately. Where the Company permits a re-booking, in addition to the proportion of the Fees incurred above, the full Fees will also be payable for the Security Testing as re-booked.

5. CONFIDENTIALITY

5.1. Each party will not disclose or permit its employees, agents and sub-contractors to disclose any Confidential Information entrusted to it by the other party provided always that this restriction shall not apply to information already in the receiving party’s possession, or which comes into the public domain other than by breach of this obligation by the receiving party or its employees, agents and sub-contractors, or which is disclosed to the receiving party or which is required to be disclosed pursuant to any law or regulation or by the rules of any stock exchange or by a court of competent jurisdiction. If Confidential Information is required to be disclosed pursuant to any law or regulation or by the rules of any stock exchange or by a court of competent jurisdiction then the Receiving Party shall notify the Disclosing Party prior to any disclosure.

6. INTELLECTUAL PROPERTY RIGHT

6.1. Ownership of all Intellectual Property Rights in the System remains at all times with the Client and/or its ISP or other third party supplier. For the avoidance of doubt, all Intellectual Property Rights in the materials used by the Company to carry out the Security Testing remain vested in the Company or any relevant third party owners.

6.2. All Intellectual Property Rights in the results of the testing shall belong to the Client.

6.3. Copyright in the Test Report shall also remain with the Company, but the Client is hereby granted a non-exclusive, non-transferable licence to copy and use the Test Report for its own internal purposes only. The Client will need prior agreement to be sent in any form to any 3rd party. In any event this will not be given to the forwarding of a Test Report to a penetration testing company or entity.

7. LIABILITY

7.1. Nothing in this clause 7 excludes or limits the liability of the Company for fraudulent misrepresentation or for death or personal injury caused by the Company’s negligence. Save as aforesaid the following provisions set out the entire financial liability of the Company (including any liability for the acts or omissions of its employees, agents and sub-contractors) to the Client, its ISP or any third party supplier of the System to the Client.

7.2. The Company shall not be liable for any loss, damage, costs, expenses or other claims for compensation arising from any material or instruction supplied by the Client which are incomplete, incorrect, inaccurate, illegible or defective in any other way. The Company should highlight to the Client any known errors.

7.3. The Company shall not be liable for any loss or damage caused to either the Client, its ISP or other third party supplier of the System either jointly or severally except to the extent that such loss or damage is caused by the negligent acts or omissions of or a breach of any contractual duty by the Company, its employees, agents or sub-contractors in performing the Security Testing.

7.4. The Company and the Client shall not be liable to each other for any indirect or consequential loss or damage whether for loss of profit, loss of business, depletion of goodwill or otherwise whatsoever or howsoever caused which arise out of or in connection with this Contract even if such loss was reasonably foreseeable

8. TERMINATION

8.1. The Company reserves the right to withdraw or delay from Security Testing by providing 5 working days’ notice, if, in its opinion, information required for satisfactory completion of the Security Testing and requested by the Company in writing is either not provided or, if provided, is inaccurate or inadequate. The Client shall be liable for any reasonable fee and expenses incurred up to and including the date of withdrawal.

8.2. Either party may (without limiting any other remedy) at any time terminate the Contract by giving written notice to the other if the other commits any material breach of these Conditions and (if capable of remedy) fails to remedy the breach within thirty (30) days after being required by written notice from the other Party to do so, or in an Event of Insolvency.

9. EXCLUSION OF THIRD PARTY RIGHTS

A person who is not a party to this Contract shall not have any rights under the Contract (Rights of Third Parties) Act 1999 to enforce any term of this Contract

10. DATA PROTECTION

10.1. In the course of providing the Security Testing, the Company may obtain Personal Data from the Client. The Client confirms that it has obtained all consents required from data subjects to enable such Personal Data to be disclosed to the Company and made all necessary registrations and notifications in accordance with applicable Data Protection Laws to enable the Company to carry out the Security Testing and the Client will ensure the same are kept accurate and up to date.

10.2. In respect of any Personal Data held or processed by the Company as a result of or pursuant to these Conditions, the Company represents to the Client that it has made all necessary registrations and notifications in accordance with applicable Data Protection Laws and that it will ensure that the same are kept accurate and up to date during the term of the agreement.

10.3. In addition to and notwithstanding any other right or obligation arising under these Conditions, the Company (and shall ensure that its Personnel shall):

  1. a) implement appropriate technical and organizational measures to protect the Personal Data (i) from accidental or unlawful destruction, and (ii) loss, alteration, unauthorized disclosure of, or access to the Data (a “Security Incident”).
  2. b) use the Personal Data obtained as a result of these Conditions only for the purposes of fulfilling its obligations under these Conditions and not disclose Personal Data without the written authority of the Client;
  3. c) comply with the express instructions or directions of the Client from time to time in connection with the use of such Personal Data and the requirements of any Data Protection Laws and such Personal Data shall be treated as Confidential Information of the Client for the purposes of these Conditions;
  4. d) not do or omit to do anything which causes the Client to breach any Data Protection Laws or contravene the terms of any registration, notification or authorization under any Data Protection Laws of the Client; and
  5. e) not transfer Personal Data which has been obtained by or made available to the Company to any country outside the European Economic Area without the prior written consent of the Client.

10.4. The Company shall not subcontract any processing of the Personal Data to a third party subcontractor without the prior written consent of the Client. If the Client refuses to consent to the Company’s appointment of a third party subcontractor on reasonable grounds relating to the protection of the Personal Data, then the Company will not appoint the subcontractor.

10.5. The Company shall not be in breach of this Clause 10 if it acts on the instructions of the Client.

10.6. If the Company believes or becomes aware that its processing of the Personal Data is likely to result in a high risk to the data protection rights and freedoms of data subjects, it shall inform the Client as soon as reasonably practicable and provide the Client with all such reasonable assistance at the Client’s cost as the Client may reasonably require in order to conduct a data protection impact assessment.

10.7. The Company will (and will ensure that its Personnel will) without undue delay notify the Client if it becomes aware of a Security Incident or if lawfully able that a disclosure of Personal Data may be required by law, or if it receives a request from an individual to access their Personal Data or to cease or not begin processing (or to rectify, block, erase or destroy Personal Data), or if it receives any communication from the Office of the Information Commissioner or similar authority relating to the Personal Data. The Company shall provide all such timely information and cooperation as the Client may reasonably require in order for the Client to fulfil its data breach reporting obligations under (and in accordance with the timescales required by) Data Protection Laws. The Company shall further take all such measures and actions as are technically practicable and within its control to remedy or mitigate the effects of the Security Incident and shall keep the Client up-to-date about all developments in connection with the Security Incident.

11. FORCE MAJEURE

11.1. Neither party to the Contract shall be deemed to be in breach of these conditions or otherwise liable to the other party in any manner whatsoever for any failure or delay in performing its obligations to the extent that the same is caused by Force Majeure. In the event the Force Majeure continues for a continuous period in excess of thirty (30) working days, either party shall be entitled to give notice in writing to the other party.

12. GENERAL

12.1. The Consultant shall have no authority to amend the terms and conditions of this Contract or to relieve the Client of any of its obligations under these conditions or to increase the Company’s obligations under these conditions or waive any of the Company’s rights under these terms and conditions. The Consultant shall have no authority to incur expenditure in the name of or an account of the Company or hold themselves out as having authority to bind the Company.

12.2. The Company does not give any warranty or undertaking or make any representation (either express or implied) as to the completeness or accuracy of any information provided to the Client prior to this Contract which relates to or is provided in respect of these terms and conditions by or on behalf of the Company.

12.3. These standard terms and conditions together with the Penetration Test Authorization Form and the Proposal, shall constitute the entire agreement between the Parties and supersede any previous agreement or understanding and may not be varied except in writing between the Parties and signed by their respective authorized signatories. All other terms and conditions express or implied by statute or otherwise, are excluded to the fullest extent permitted by law. As regards Security Testing, in the event of any conflict between any of the terms of these documents the following order shall prevail:

(1) Penetration Test Authorization Form;

(2) the terms and conditions in this Contract; and

(3) Proposal.

12.4. Any notice sent under this Contract shall be in writing addressed to the other Party at its registered office or principal place of business or such other address as may be notified by each Party to the other time to time.

12.5. No failure or delay by either party in exercising any of its rights under this Contract shall be deemed to be a waiver of that right.

12.6. If any provision or any part of a provision of this Contract is held by any authority to be invalid and unenforceable, the validity of the other provisions and/or the remaining part of the provision shall not be affected.