Malicious intruders are constantly finding new ways to compromise your company’s network. One of the emerging methods favored by hackers is attacking improperly secured mobile devices like notebook computers, PDAs, Pocket PCs, smartphones, and BlackBerries. These mobile devices all have access to your corporate network via email, VPNs, and other remote access methods.
Foundstone continues with its pioneering efforts in the field of security by protecting your company from the latest mobile security threats. We will assess and attempt to penetrate your mobile network. This combined approach to identifying security vulnerabilities ensures that the greatest number security holes are discovered.
Foundstone will follow the four major phases listed below during your assessment: