Overview


We thought what is the use of having years of knowledge base and experience base in the cyber security domain unless we extend it to certify products. Lately many hardware and software vendors are coming up with their out-of-the-box products.

Product's Security Certification

We thought what is the use of having years of knowledge base and experience base in the cyber security domain unless we extend it to certify products. Lately many hardware and software vendors are coming up with their out-of-the-box products. When they take those to their customers, they are often asked about the security of that product from two important perspectives.
  • Data At Rest

  • Data In Transit

This is a very valid and crucial awareness among the customers because they are caring about their data, as well as that of their customers or associate companies. We at Valency Networks, provide Product's Security Certification or Endorsement as a service and cater to the following product verticals and few examples of each.

Network Appliances/Devices

  • Firewalls (Layer -2 / 3 / 7) / UTMs

  • Routers / Switches (Layer -2/3)

  • Intrusion Prevention Devices

  • Antivirus / Antimalware appliances

Mobile App Products

  • Apps storing sensitive data

  • Apps calling web services

  • Android / iOS platforms

Web Products

  • Web Portals storing data

  • E-Commerce websites

  • Payment Gateway Solutions

Client/Server Products

  • Desktop apps using database

  • Localized Non-Web software

Cloud Products

  • CRM software

  • Online ERP solutions


What exactly do we do?

Its simple. We take the product from you under a consent to perform dissection or a brute force operation. We also study the product architecture and map it with various potential security problems that can arise due to incorrect or in-adequate security design practices. We also do bit of reverse engineering to see if any part of code or product functionality can be exploited in future. All this is performed using industry standard tools which capture tons of logs. Valency Networks' technical team uses their years of experience to go through the logs, find vulnerabilities and perform further analysis. Further to that, customer gets a detailed report of problems and mitigation/resolution solutions. Once the customer fixes all bugs and problems, we perform another round of testing to ascertain that the problems are indeed fixed. Upon such a verification, we provide a certificate of endorsement for that product make/model/version or the software build.


What do you get?

We provide you with a certificate of endorsement which displays your firm's name and the product being endorsed. We also categorically mention various security areas for which the product passed the testing. The report also contains a link to a web page on Valency Networks' website, which your customer can visit and know about all the tests and industry standard methods used to perform the testing. Please click here to see a sample certificate copy.



Cyber Security Services

Features

Process

Benefits

FAQ

Related Links

A typical website penetration testing service comprises of simulation of real life hacking methodologies. It encompasees various security attack vectors and exploitation of potential vulnerabilities. Read More
We follow a systematic and yet agile approach to test website security. This helps our customers gain an extremly accurate and elaborate results along with a knowledge base and years of experience on the subject matter.Read More
Security testing is a continuous improvement process to get benefited in terms of increasing ROI (Returns On Investment). Benefits of a pen-test are short term as well as long term. Read More
Here is a list of typical questions which are in the minds of those who wish to leverage our services. If you see more information, feel free to contact us. Read More
Please see a list of key vulnerabilities which must be tested while performing a website or webportal penetration testing. Read More

Testimonials