Spirent SecurityLabs

Spirent SecurityLabsのサービスは、クライアントの組織をわずかに変えることで高い効果を生み出します。経験豊富なセキュリティのプロが集まった当社の専門チームが、ネットワーク、ワイヤレス、ウェブサイト、モバイルアプリ、組み込み機器に向けた包括的なスキャニング、侵入テスト、監視サービスや、ソースコードの解析を提供します。

データシートを見る →

Breaching the External Network Security Perimeter

On-Demand Webinar

Network security device vendors are stepping up and doing a decent job at preventing external attacks on your network infrastructure but attackers are always looking for innovative ways of breaking in. In this on-demand webinar, we will explore various techniques to walk around such protections and gain access to the internal network as an outsider with access to nothing but Internet.

White Paper

This paper discusses the technical details involved with open-source intelligence gathering and using that intelligence to penetrate an organization’s perimeter and gain access to the internal network. We will also describe several protection mechanisms that organizations can implement to protect themselves against such attacks.


Networks and wireless

In depth testing of your networks to uncover exploitable vulnerabilities, including insecure server/firewall configuration, unpatched servers with known vulnerabilities, rogue access points, eavesdropping, information leakage and improper error handling.

Wireless testing includes checking wireless access points in range, presence of rogue devices, physical access to the wireless, weak encryption usage and security of the access points connected to the wired network.

Web and mobile applications

Scalable testing from OWASP Top 10 to comprehensive penetration testing of mission critical applications ensuring all applications within your organization are routinely tested for risk to evolving threats.

For mobile applications we also test binary code, related web services and http(s) communication for dynamic analysis and device end security.

Devices

Comprehensive testing of devices including those used for networking, connected vehicles, and various IoT uses including monitoring, supply chain, facility management, and manufacturing process.

We assess the device firmware, binary code, related web services and http(s) communication for exploitable vulnerabilities, discover and exploit underlying web application for security weaknesses such as authentication bypass, authorization boundary, CSRF & XSS in Embedded Web Application Servers and many others.

ソースコード解析

一部のセキュリティ脆弱性は、コードがコンパイルされると検出が難しくなります。当社のコードレビューサービスを活用することで、バッファオーバーフロー、SQLインジェクションフロー、バックドア、認証バイパス、認可境界などの脆弱性を探し出すことができます。「スタティック(静的)」なソースコードの解析で、テイント解析やデータフローといった技術を駆使することにより、開発ライフサイクル内でセキュリティを構築することをお手伝いします。

セキュアなアプリケーション・ネットワーク・デバイスが何よりも重要

近年、「慎重に作り上げられた(carefully-crafted)」デジタルコードが、多くの企業や国家の安全対策を回避しています。ビジネスの世界では、慎重に作り上げられたコードのパケットが数多くの企業に侵入し、デリケートな業務上のデータやユーザデータを盗取しています。これらの攻撃の中には、何十年もかけて築き上げられた数十億ドル規模の世界的ブランドの信用を破壊してしまったものもあります。

念入りに作られた、重層的なサイバセキュリティでも、多くの脆弱性を含んでいます。これらの脆弱性を発見し、新たな悪用方法を編み出すには、創意工夫が必要です。

侵入テストの役割

倫理的ハッキング訓練により、あなたの組織のセキュリティ上の弱点とデジタルなリスクを発見することができます。悪意の有無にかかわらず、誰かに明らかにされる前に見つけ出せます。

ホワイトペーパ ダウンロード →

Connected Vehicle Resources

On-Demand Webinar

Learn about the growing threat landscape for connected vehicles as they incorporate more “smart” features to become increasingly connected with outside services and how to better secure critical systems.

Watch now →

Securing the Connected Vehicle

Preventing, detecting, and remediating cyber-attacks have been an important security concerns for the technology industry. But as the new world of connected devices converge, the personal vehicle has become a target.

Download white paper →

Spirent Automotive Solutions

With Spirent, you can test, refine, and optimize all aspects of in-car, V2V, and V2X connectivity to provide the experiences that modern drivers and passengers demand.

Learn more →

IoT Security Resources

On-Demand Webinar

The Internet of Things (IoT) plays a key role in the monitoring, facility management, and manufacturing processes used by many organizations. Learn the current state of IoT security, identities potential threat vectors, how to assess vulnerabilities, and suggestions on a remediation processes.

Watch now →

IoT Security within the Enterprise

With the increased prevalence of IoT devices, security breaches with these devices are also on the rise. Learn to assess the device firmware, binary code, related web services and http(s) communication for exploitable vulnerabilities, discover and exploit underlying web application for security weaknesses.

Download white paper →

Spirent IoT Solutions

IoT success means navigating new technologies, multiple standards, intense competition, and security threats. Learn how Spirent solutions help developers, operators, and service providers optimize their IoT solution and get to market faster.

Learn more →

あなたのビジネスに合う製品をお探しですか?

お問い合わせ →