Cyver Core offers a pentest management platform, where you can actively set up and request Pentests. In most cases, the Pentest setup process will look something like this:
- You create a Pentest in the platform, set a requested date, and send it to your Pentester
- The Pentester reviews the Pentest and responds with a prospective budget, as well as any changes they’d like to make the Pentest feasible
- You approve the new Pentest or make more changes
- The Pentest goes into the Pentester’s backlog following approval
- Kickoff is scheduled
- On the set date, the Pentester starts work
- Findings are uploaded to the Project, and your developers receive notifications
- You can log in at any time to view status, threat reports, overviews, and progress
- Developers can discuss remediation, status, and request retesting through the Pentest
- On completion, you schedule the same Pentest again according to your testing schedule
This means that a) all pentest management is handled in Cyver Core’s secure environment. No more email. It also means pentesting become a recurring process, because new pentests are automatically scheduled as part of the first. And, it means that all Findings are delivered as actionable work items, which your team can pick up and remediate without sifting through a long report.
To set up your first Pentest, click here.