Test Your Defenses Before Someone Else Does

Network Penetration Testing

At Filament Information Security, we simulate real-world network-based cyberattacks to identify and help fix security gaps, before malicious actors exploit them.

Our testing process follows industry-recognized best practices, giving your team actionable insight into how resilient your internal and external networks truly are.

Why Filament?

  • Nonprofit Costing: Get expert support at a lower cost from a fellow nonprofit.
  • Flexible Engagements: Schedules that fit your needs and timelines.
  • Experienced Professionals: Benefit from our team’s years of experience and industry certifications.

Our Network Penetration Testing Process

Our methodology mirrors the steps a real attacker would take, from probing exposed services to escalating inside your environment.

  1. Pre-Engagement & Scoping
    Define rules of engagement, testing boundaries, and goals.
  2. Reconnaissance
    Identify exposed systems, open ports, and potential vulnerabilities.
  3. Vulnerability Analysis
    Analyze assets for weak configurations, outdated software, or exploitable services.
  4. Exploitation
    Attempt exploitation to demonstrate impact (unauthorized access, privilege escalation, etc.).
  5. Post-Exploitation
    Assess lateral movement potential and access to sensitive data.
  6. Reporting & Debrief
    Provide detailed findings, risk ratings, remediation guidance, and optional debrief sessions.

    Types of Network Penetration Testing

    • External Network Testing
      Assess internet-facing assets like firewalls, VPNs, and exposed services.
    • Internal Network Testing
      Simulate a compromised device or insider threat to test your internal posture.
    • Wireless Testing
      Evaluate wireless networks for weak encryption, misconfiguration, or rogue access points.
    • Social Engineering
      Test staff readiness with phishing or pretexting campaigns.

    Meet the Team

    Art Provost

    Art Provost

    Art, with 30 years of experience in Information Security across diverse roles, joined Filament in 2011 and holds multiple certifications, including CISSP, GSEC, GPEN, GWAPT, and CISM.

    Tyler Malcom

    Tyler Malcom

    Tyler, who joined Filament in 2022, has a strong background in cyber defense and offensive operations from his time in the US Navy and holds CISSP and GSEC certifications.

    Keri Kunkle

    Keri Kunkle

    Keri, who joined Filament in 2023, is a seasoned cybersecurity professional with experience in the US Marine Corps and Department of Defense, holding multiple certifications and advanced degrees in cybersecurity.

    Expert Help is On the Way

    Schedule a Free Discovery Call

    Explore your organization’s future with a quick conversation with Filament Information Security services.

    Contact us today to learn more about how we can help you achieve your security goals.