{"id":15,"date":"2022-11-02T18:54:46","date_gmt":"2022-11-02T18:54:46","guid":{"rendered":"https:\/\/www.propelex.com\/?page_id=15"},"modified":"2023-08-30T15:52:23","modified_gmt":"2023-08-30T15:52:23","slug":"penetration-testing","status":"publish","type":"page","link":"https:\/\/www.propelex.com\/penetration-testing\/","title":{"rendered":"Penetration testing"},"content":{"rendered":"

[et_pb_section fb_built=”1″ custom_padding_last_edited=”on|phone” _builder_version=”4.18.0″ _module_preset=”default” background_image=”https:\/\/www.propelex.com\/wp-content\/uploads\/2022\/12\/psd-pnt-back.jpg” custom_margin=”-72px||||false|false” custom_margin_tablet=”-72px||||false|false” custom_margin_phone=”-94px||||false|false” custom_margin_last_edited=”on|phone” custom_padding=”180px||120px||false|false” custom_padding_tablet=”180px||120px||false|false” custom_padding_phone=”120px||64px||false|false” hover_enabled=”0″ global_colors_info=”{}” sticky_enabled=”0″][et_pb_row _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” header_font=”Inter|300|||||||” header_text_align=”center” header_text_color=”#FFFFFF” header_font_size=”60px” header_line_height=”1.2em” custom_margin=”||||false|false” header_text_align_tablet=”center” header_text_align_phone=”left” header_text_align_last_edited=”off|phone” header_font_size_tablet=”60px” header_font_size_phone=”40px” header_font_size_last_edited=”on|phone” global_colors_info=”{}”]<\/p>\n

Penetration Testing<\/h1>\n

[\/et_pb_text][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” header_2_font=”Space Grotesk|300|||||||” header_2_text_align=”center” header_2_text_color=”#FFFFFF” header_2_font_size=”32px” header_2_line_height=”1.2em” header_2_text_align_tablet=”center” header_2_text_align_phone=”left” header_2_text_align_last_edited=”off|phone” header_2_font_size_tablet=”32px” header_2_font_size_phone=”20px” header_2_font_size_last_edited=”on|phone” global_colors_info=”{}”]<\/p>\n

Discover\u00a0before <\/span> attackers uncover<\/h2>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.18.0″ _module_preset=”default” background_color=”gcid-337d421c-6fe7-441a-89a0-a2e41b885893″ custom_padding=”80px||80px|||” global_colors_info=”{%22gcid-337d421c-6fe7-441a-89a0-a2e41b885893%22:%91%22background_color%22%93}”][et_pb_row column_structure=”1_3,1_3,1_3″ use_custom_gutter=”on” gutter_width=”1″ _builder_version=”4.18.0″ _module_preset=”default” custom_margin=”0px||40px||false|false” custom_padding=”0px||0px||false|false” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.18.0″ _module_preset=”default” custom_css_main_element=”width: 50% !important” global_colors_info=”{}” custom_css_main_element_last_edited=”on|phone” custom_css_main_element_phone=” ” custom_css_main_element_tablet=” “][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_font=”|300|||||||” text_text_color=”#FFFFFF” text_font_size=”50px” text_line_height=”1.2em” header_3_font=”|300|||||||” header_3_text_color=”#FFFFFF” header_3_font_size=”48px” custom_margin=”40px||||false|false” custom_margin_tablet=”40px||40px||false|false” custom_margin_phone=”” custom_margin_last_edited=”on|phone” custom_padding=”|148px|||false|false” custom_padding_tablet=”|0px|||false|false” custom_padding_phone=”|0px|||false|false” custom_padding_last_edited=”on|tablet” header_3_font_size_tablet=”32px” header_3_font_size_phone=”” header_3_font_size_last_edited=”on|phone” global_colors_info=”{}”]<\/p>\n

Industry Challenges<\/h3>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.18.0″ _module_preset=”default” custom_padding=”|24px|||false|false” custom_css_main_element=”width: 25% !important” global_colors_info=”{}” custom_css_main_element_last_edited=”on|phone” custom_css_main_element_phone=” ” custom_css_main_element_tablet=” “][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_font=”|700|||||||” text_text_color=”#FFFFFF” text_font_size=”16px” custom_margin=”40px||16px||false|false” custom_margin_tablet=”16px||||false|false” custom_margin_phone=”” custom_margin_last_edited=”on|tablet” global_colors_info=”{}”]<\/p>\n

Threat Awareness<\/p>\n

[\/et_pb_text][et_pb_code _builder_version=”4.18.0″ _module_preset=”default” custom_margin=”||16px||false|false” global_colors_info=”{}”]<\/p>\n

<\/div>\n

[\/et_pb_code][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_font=”|300|||||||” text_text_color=”gcid-744068a2-af64-42f6-ba19-e42fe94eccd9″ text_font_size=”16px” custom_margin=”||||false|false” global_colors_info=”{%22gcid-744068a2-af64-42f6-ba19-e42fe94eccd9%22:%91%22text_text_color%22%93}”]<\/p>\n

Discover the hidden security flaws, control gaps, and configuration loopholes that can compromise your network systems, cloud, web and mobile applications.<\/p>\n

[\/et_pb_text][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_font=”|700|||||||” text_text_color=”#FFFFFF” text_font_size=”16px” custom_margin=”40px||16px||false|false” custom_margin_tablet=”24px||||false|false” custom_margin_phone=”” custom_margin_last_edited=”on|tablet” global_colors_info=”{}”]<\/p>\n

Threat Vector<\/p>\n

[\/et_pb_text][et_pb_code _builder_version=”4.18.0″ _module_preset=”default” custom_margin=”||16px||false|false” global_colors_info=”{}”]<\/p>\n

<\/div>\n

[\/et_pb_code][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_font=”|300|||||||” text_text_color=”gcid-744068a2-af64-42f6-ba19-e42fe94eccd9″ text_font_size=”16px” custom_margin=”||||false|false” global_colors_info=”{%22gcid-744068a2-af64-42f6-ba19-e42fe94eccd9%22:%91%22text_text_color%22%93}”]<\/p>\n

Have a detailed analysis and report on assets\u2019 vulnerabilities.<\/p>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.18.0″ _module_preset=”default” custom_padding=”|24px|||false|false” custom_css_main_element=”width: 25% !important” global_colors_info=”{}” custom_css_main_element_last_edited=”on|desktop” custom_css_main_element_phone=” ” custom_css_main_element_tablet=” “][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_font=”|700|||||||” text_text_color=”#FFFFFF” text_font_size=”16px” custom_margin=”40px||16px||false|false” custom_margin_tablet=”26px||||false|false” custom_margin_phone=”” custom_margin_last_edited=”on|tablet” global_colors_info=”{}”]<\/p>\n

Meet Compliance Standards<\/p>\n

[\/et_pb_text][et_pb_code _builder_version=”4.18.0″ _module_preset=”default” custom_margin=”||16px||false|false” global_colors_info=”{}”]<\/p>\n

<\/div>\n

[\/et_pb_code][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_font=”|300|||||||” text_text_color=”gcid-744068a2-af64-42f6-ba19-e42fe94eccd9″ text_font_size=”16px” custom_margin=”||||false|false” global_colors_info=”{%22gcid-744068a2-af64-42f6-ba19-e42fe94eccd9%22:%91%22text_text_color%22%93}”]<\/p>\n

Achieve compliance with government regulations, control frameworks and certification requirements.<\/p>\n

[\/et_pb_text][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_font=”|700|||||||” text_text_color=”#FFFFFF” text_font_size=”16px” custom_margin=”60px||16px||false|false” custom_margin_tablet=”25px||||false|false” custom_margin_phone=”” custom_margin_last_edited=”on|tablet” global_colors_info=”{}”]<\/p>\n

Data Breach<\/p>\n

[\/et_pb_text][et_pb_code _builder_version=”4.18.0″ _module_preset=”default” custom_margin=”||16px||false|false” global_colors_info=”{}”]<\/p>\n

<\/div>\n

[\/et_pb_code][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_font=”|300|||||||” text_text_color=”gcid-744068a2-af64-42f6-ba19-e42fe94eccd9″ text_font_size=”16px” custom_margin=”||||false|false” global_colors_info=”{%22gcid-744068a2-af64-42f6-ba19-e42fe94eccd9%22:%91%22text_text_color%22%93}”]<\/p>\n

Reduce vulnerability exploitation risks that may lead to data breaches.<\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.18.0″ _module_preset=”default” background_image=”https:\/\/www.propelex.com\/wp-content\/uploads\/2022\/11\/section-break-mss-80.jpg” custom_padding=”0px||120px||false|false” global_colors_info=”{}”][et_pb_row _builder_version=”4.18.0″ _module_preset=”default” custom_margin=”0px||||false|false” custom_padding=”0px||0px||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_code _builder_version=”4.18.0″ _module_preset=”default” custom_margin=”-44px||64px||false|false” global_colors_info=”{}”]<\/p>\n

<\/div>\n

<\/p>\n

<\/div>\n

[\/et_pb_code][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” header_2_font=”|700|||||||” header_2_text_color=”#FFFFFF” header_2_font_size=”48px” header_4_font=”|700|||||||” header_4_text_color=”#FFFFFF” header_4_font_size=”48px” header_2_font_size_tablet=”48px” header_2_font_size_phone=”48px” header_2_font_size_last_edited=”on|desktop” global_colors_info=”{}”]<\/p>\n

Solutions<\/h2>\n

[\/et_pb_text][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_font=”|300|||||||” text_text_color=”#FFFFFF” text_font_size=”18px” text_line_height=”1.4em” custom_padding=”|30%|||false|false” custom_padding_tablet=”|0%|||false|false” custom_padding_phone=”|0%|||false|false” custom_padding_last_edited=”on|phone” global_colors_info=”{}”]<\/p>\n

Propelex provides Red Team penetration testing services that combine security expert-led operations with automated tools and technologies. Our best-of-both worlds methodology generates outstanding insights and supports the delivery of required security outcomes.<\/p>\n

[\/et_pb_text][et_pb_code _builder_version=”4.18.0″ _module_preset=”default” custom_margin=”-64px|||-100px|false|false” custom_margin_tablet=”-64px|||-72px|false|false” custom_margin_phone=”|||-66px|false|false” custom_margin_last_edited=”on|phone” global_colors_info=”{}”]<\/p>\n

<\/div>\n

<\/p>\n

<\/div>\n

<\/p>\n

<\/div>\n

[\/et_pb_code][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.18.0″ _module_preset=”default” locked=”off” global_colors_info=”{}”][et_pb_row column_structure=”1_4,1_4,1_4,1_4″ use_custom_gutter=”on” gutter_width=”1″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”1_4″ _builder_version=”4.18.0″ _module_preset=”default” custom_padding=”40px||||false|false” custom_css_main_element=”width: 10% !important” global_colors_info=”{}” custom_css_main_element_last_edited=”on|tablet” custom_css_main_element_tablet=”width: 20% !important” custom_css_main_element_phone=”width: 25% !important”][et_pb_image src=”https:\/\/www.propelex.com\/wp-content\/uploads\/2022\/11\/pt-1.png” title_text=”pt 1″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.18.0″ _module_preset=”default” custom_padding=”40px||||false|false” custom_padding_tablet=”40px||||false|false” custom_padding_phone=”|||24px|false|false” custom_padding_last_edited=”on|phone” custom_css_main_element=”width: 40% !important” global_colors_info=”{}” custom_css_main_element_last_edited=”on|desktop” custom_css_main_element_tablet=”width: 80% !important” custom_css_main_element_phone=”width: 75% !important”][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_font=”|300|||||||” text_text_color=”gcid-2807c2c4-36f6-4176-bc2a-836a3643cd0c” header_4_font=”|300|||||||” header_4_text_color=”gcid-d69e7c30-8093-414c-91fd-8411e56f2ea9″ header_4_font_size=”20px” global_colors_info=”{%22gcid-d69e7c30-8093-414c-91fd-8411e56f2ea9%22:%91%22header_4_text_color%22%93,%22gcid-2807c2c4-36f6-4176-bc2a-836a3643cd0c%22:%91%22text_text_color%22%93}”]<\/p>\n

Network & Devices
Penetration Testing<\/h4>\n
    \n
  • External Network<\/li>\n
  • Internal Network<\/li>\n
  • Wireless Pentest<\/li>\n
  • IoT Devices<\/li>\n
  • SCADA & ICS<\/li>\n<\/ul>\n

    [\/et_pb_text][\/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.18.0″ _module_preset=”default” custom_padding=”40px||||false|false” custom_css_main_element=”width: 10% !important” global_colors_info=”{}” custom_css_main_element_last_edited=”on|tablet” custom_css_main_element_tablet=”width: 20% !important” custom_css_main_element_phone=”width: 25% !important”][et_pb_image src=”https:\/\/www.propelex.com\/wp-content\/uploads\/2022\/11\/pt-2.png” title_text=”pt 2″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.18.0″ _module_preset=”default” custom_padding=”40px||||false|false” custom_padding_tablet=”40px||||false|false” custom_padding_phone=”|||24px|false|false” custom_padding_last_edited=”on|phone” custom_css_main_element=”width: 40% !important” global_colors_info=”{}” custom_css_main_element_last_edited=”on|desktop” custom_css_main_element_tablet=”width: 80% !important” custom_css_main_element_phone=”width: 75% !important”][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_font=”|300|||||||” text_text_color=”gcid-2807c2c4-36f6-4176-bc2a-836a3643cd0c” header_4_font=”|300|||||||” header_4_text_color=”gcid-d69e7c30-8093-414c-91fd-8411e56f2ea9″ header_4_font_size=”20px” global_colors_info=”{%22gcid-d69e7c30-8093-414c-91fd-8411e56f2ea9%22:%91%22header_4_text_color%22%93,%22gcid-2807c2c4-36f6-4176-bc2a-836a3643cd0c%22:%91%22text_text_color%22%93}”]<\/p>\n

    Cloud Security Testing<\/h4>\n
      \n
    • Internal Cloud Network & Systems<\/li>\n
    • External Cloud Services<\/li>\n
    • Configuration Reviews<\/li>\n
    • Priviledged Access Control<\/li>\n
    • Hosting Services (Application, Serverless Hosting and File Storage).<\/li>\n<\/ul>\n

      [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_4,1_4,1_4,1_4″ use_custom_gutter=”on” gutter_width=”1″ custom_padding_last_edited=”on|desktop” _builder_version=”4.18.0″ _module_preset=”default” custom_padding=”0px||||false|false” custom_padding_tablet=”0px||||false|false” custom_padding_phone=”0px||||false|false” global_colors_info=”{}”][et_pb_column type=”1_4″ _builder_version=”4.18.0″ _module_preset=”default” custom_padding=”40px||||false|false” custom_css_main_element=”width: 10% !important” global_colors_info=”{}” custom_css_main_element_last_edited=”on|tablet” custom_css_main_element_tablet=”width: 20% !important” custom_css_main_element_phone=”width: 25% !important”][et_pb_image src=”https:\/\/www.propelex.com\/wp-content\/uploads\/2022\/11\/pt-3.png” title_text=”pt 3″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.18.0″ _module_preset=”default” custom_padding=”40px||||false|false” custom_padding_tablet=”40px||||false|false” custom_padding_phone=”|||24px|false|false” custom_padding_last_edited=”on|phone” custom_css_main_element=”width: 40% !important” global_colors_info=”{}” custom_css_main_element_last_edited=”on|desktop” custom_css_main_element_tablet=”width: 80% !important” custom_css_main_element_phone=”width: 75% !important”][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_font=”|300|||||||” text_text_color=”gcid-2807c2c4-36f6-4176-bc2a-836a3643cd0c” header_4_font=”|300|||||||” header_4_text_color=”gcid-d69e7c30-8093-414c-91fd-8411e56f2ea9″ header_4_font_size=”20px” global_colors_info=”{%22gcid-d69e7c30-8093-414c-91fd-8411e56f2ea9%22:%91%22header_4_text_color%22%93,%22gcid-2807c2c4-36f6-4176-bc2a-836a3643cd0c%22:%91%22text_text_color%22%93}”]<\/p>\n

      Web Application & Mobile
      Penetration Testing<\/h4>\n
        \n
      • Session Management<\/li>\n
      • Configuration Management<\/li>\n
      • Authentication, Authorization<\/li>\n
      • Data Input Validation<\/li>\n
      • Web \/ API<\/li>\n<\/ul>\n

        [\/et_pb_text][\/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.18.0″ _module_preset=”default” custom_padding=”40px||||false|false” custom_css_main_element=”width: 10% !important” global_colors_info=”{}” custom_css_main_element_last_edited=”on|tablet” custom_css_main_element_tablet=”width: 20% !important” custom_css_main_element_phone=”width: 25% !important”][et_pb_image src=”https:\/\/www.propelex.com\/wp-content\/uploads\/2022\/11\/pt-4.png” title_text=”pt 4″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.18.0″ _module_preset=”default” custom_padding=”40px||||false|false” custom_padding_tablet=”40px||||false|false” custom_padding_phone=”|||24px|false|false” custom_padding_last_edited=”on|phone” custom_css_main_element=”width: 40% !important” global_colors_info=”{}” custom_css_main_element_last_edited=”on|desktop” custom_css_main_element_tablet=”width: 80% !important” custom_css_main_element_phone=”width: 75% !important”][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_font=”|300|||||||” text_text_color=”gcid-2807c2c4-36f6-4176-bc2a-836a3643cd0c” header_4_font=”|300|||||||” header_4_text_color=”gcid-d69e7c30-8093-414c-91fd-8411e56f2ea9″ header_4_font_size=”20px” global_colors_info=”{%22gcid-d69e7c30-8093-414c-91fd-8411e56f2ea9%22:%91%22header_4_text_color%22%93,%22gcid-2807c2c4-36f6-4176-bc2a-836a3643cd0c%22:%91%22text_text_color%22%93}”]<\/p>\n

        Physical Security Testing<\/h4>\n
          \n
        • Situation Awareness<\/li>\n
        • Biometrics<\/li>\n
        • Physical Barriers<\/li>\n
        • Social Engineering<\/li>\n
        • Phishing Campaign<\/li>\n
        • Cameras and Sensor<\/li>\n
        • Doors and locks<\/li>\n<\/ul>\n

          [\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.18.0″ _module_preset=”default” locked=”off” global_colors_info=”{}”][et_pb_row _builder_version=”4.18.0″ _module_preset=”default” custom_margin=”-56px|auto||auto||” custom_padding=”60px|||||” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” header_2_font=”|300|||||||” header_2_text_align=”center” header_2_font_size=”50px” header_4_font=”|300|||||||” header_4_text_align=”center” header_4_font_size=”40px” header_2_font_size_tablet=”40px” header_2_font_size_phone=”40px” header_2_font_size_last_edited=”on|desktop” global_colors_info=”{%22gcid-d69e7c30-8093-414c-91fd-8411e56f2ea9%22:%91%22text_text_color%22%93,%22gcid-337d421c-6fe7-441a-89a0-a2e41b885893%22:%91%22header_text_color%22%93}”]<\/p>\n

          Our Approach<\/h2>\n

          [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_5,1_5,1_5,1_5,1_5″ use_custom_gutter=”on” gutter_width=”1″ disabled_on=”on|on|off” _builder_version=”4.18.0″ _module_preset=”default” width=”910px” global_colors_info=”{}”][et_pb_column type=”1_5″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/www.propelex.com\/wp-content\/uploads\/2022\/11\/ptesting-1.svg” title_text=”ptesting 1″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/www.propelex.com\/wp-content\/uploads\/2022\/11\/ptesting-2.svg” title_text=”ptesting 2″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/www.propelex.com\/wp-content\/uploads\/2022\/11\/ptesting-3.svg” title_text=”ptesting 3″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/www.propelex.com\/wp-content\/uploads\/2022\/11\/ptesting-4.svg” title_text=”ptesting 4″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/www.propelex.com\/wp-content\/uploads\/2022\/11\/ptesting-5.svg” title_text=”ptesting 5″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_5,1_5,1_5,1_5,1_5″ use_custom_gutter=”on” gutter_width=”1″ disabled_on=”on|on|off” _builder_version=”4.18.0″ _module_preset=”default” width=”910px” global_colors_info=”{}”][et_pb_column type=”1_5″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” header_4_font=”|300|||||||” header_4_text_align=”center” custom_padding=”|20px||20px|false|false” locked=”off” global_colors_info=”{}”]<\/p>\n

          Reconnaissance<\/h4>\n

          [\/et_pb_text][\/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” header_4_font=”|300|||||||” header_4_text_align=”center” custom_padding=”|20px||20px|false|false” locked=”off” global_colors_info=”{}”]<\/p>\n

          Threat Modeling<\/h4>\n

          [\/et_pb_text][\/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” header_4_font=”|300|||||||” header_4_text_align=”center” custom_padding=”|20px||20px|false|false” locked=”off” global_colors_info=”{}”]<\/p>\n

          Threat Analyze<\/h4>\n

          [\/et_pb_text][\/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” header_4_font=”|300|||||||” header_4_text_align=”center” custom_padding=”|20px||20px|false|false” locked=”off” global_colors_info=”{}”]<\/p>\n

          Exploitation<\/h4>\n

          [\/et_pb_text][\/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” header_4_font=”|300|||||||” header_4_text_align=”center” custom_padding=”|20px||20px|false|false” locked=”off” global_colors_info=”{}”]<\/p>\n

          Reporting<\/h4>\n

          [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_2,1_2″ use_custom_gutter=”on” gutter_width=”1″ disabled_on=”off|off|on” _builder_version=”4.18.0″ _module_preset=”default” custom_margin=”|auto|32px|auto||” custom_padding=”24px|24px|24px|24px|false|false” border_radii=”on|12px|12px|12px|12px” border_width_all=”1px” border_color_all=”#efefef” box_shadow_style=”preset3″ box_shadow_color=”rgba(0,0,0,0.09)” locked=”off” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.18.0″ _module_preset=”default” custom_css_main_element=”width: 20% !important” global_colors_info=”{}”][et_pb_image src=”https:\/\/www.propelex.com\/wp-content\/uploads\/2022\/11\/ptmobile1.svg” title_text=”ptmobile1″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.18.0″ _module_preset=”default” custom_css_main_element=”width: 80% !important” global_colors_info=”{}”][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” header_font=”|300|||||||” header_font_size=”20px” header_3_font_size=”20px” header_4_font=”Inter|300|||||||” header_4_font_size=”20px” custom_margin=”20px|||||” custom_margin_tablet=”20px|||||” custom_margin_phone=”13px||||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|||24px|false|false” global_colors_info=”{}”]<\/p>\n

          Reconnaissance<\/h4>\n

          [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_2,1_2″ use_custom_gutter=”on” gutter_width=”1″ disabled_on=”off|off|on” _builder_version=”4.18.0″ _module_preset=”default” custom_margin=”|auto|32px|auto||” custom_padding=”24px|24px|24px|24px|false|false” border_radii=”on|12px|12px|12px|12px” border_width_all=”1px” border_color_all=”#efefef” box_shadow_style=”preset3″ box_shadow_color=”rgba(0,0,0,0.09)” locked=”off” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.18.0″ _module_preset=”default” custom_css_main_element=”width: 20% !important” global_colors_info=”{}”][et_pb_image src=”https:\/\/www.propelex.com\/wp-content\/uploads\/2022\/11\/ptmobile2.svg” title_text=”ptmobile2″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.18.0″ _module_preset=”default” custom_css_main_element=”width: 80% !important” global_colors_info=”{}”][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” header_font=”|300|||||||” header_font_size=”20px” header_3_font_size=”20px” header_4_font=”Inter|300|||||||” header_4_font_size=”20px” custom_margin=”20px|||||” custom_margin_tablet=”20px|||||” custom_margin_phone=”13px||||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|||24px|false|false” global_colors_info=”{}”]<\/p>\n

          Threat Modeling<\/h4>\n

          [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_2,1_2″ use_custom_gutter=”on” gutter_width=”1″ disabled_on=”off|off|on” _builder_version=”4.18.0″ _module_preset=”default” custom_margin=”|auto|32px|auto||” custom_padding=”24px|24px|24px|24px|false|false” border_radii=”on|12px|12px|12px|12px” border_width_all=”1px” border_color_all=”#efefef” box_shadow_style=”preset3″ box_shadow_color=”rgba(0,0,0,0.09)” locked=”off” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.18.0″ _module_preset=”default” custom_css_main_element=”width: 20% !important” global_colors_info=”{}”][et_pb_image src=”https:\/\/www.propelex.com\/wp-content\/uploads\/2022\/11\/ptmobile3.svg” title_text=”ptmobile3″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.18.0″ _module_preset=”default” custom_css_main_element=”width: 80% !important” global_colors_info=”{}”][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” header_font=”|300|||||||” header_font_size=”20px” header_3_font_size=”20px” header_4_font=”Inter|300|||||||” header_4_font_size=”20px” custom_margin=”20px|||||” custom_margin_tablet=”20px|||||” custom_margin_phone=”13px||||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|||24px|false|false” global_colors_info=”{}”]<\/p>\n

          Threat Analyze<\/h4>\n

          [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_2,1_2″ use_custom_gutter=”on” gutter_width=”1″ disabled_on=”off|off|on” _builder_version=”4.18.0″ _module_preset=”default” custom_margin=”|auto|32px|auto||” custom_padding=”24px|24px|24px|24px|false|false” border_radii=”on|12px|12px|12px|12px” border_width_all=”1px” border_color_all=”#efefef” box_shadow_style=”preset3″ box_shadow_color=”rgba(0,0,0,0.09)” locked=”off” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.18.0″ _module_preset=”default” custom_css_main_element=”width: 20% !important” global_colors_info=”{}”][et_pb_image src=”https:\/\/www.propelex.com\/wp-content\/uploads\/2022\/11\/ptmobile4.svg” title_text=”ptmobile4″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.18.0″ _module_preset=”default” custom_css_main_element=”width: 80% !important” global_colors_info=”{}”][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” header_font=”|300|||||||” header_font_size=”20px” header_3_font_size=”20px” header_4_font=”Inter|300|||||||” header_4_font_size=”20px” custom_margin=”20px|||||” custom_margin_tablet=”20px|||||” custom_margin_phone=”13px||||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|||24px|false|false” global_colors_info=”{}”]<\/p>\n

          Exploitation<\/h4>\n

          [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_2,1_2″ use_custom_gutter=”on” gutter_width=”1″ disabled_on=”off|off|on” _builder_version=”4.18.0″ _module_preset=”default” custom_margin=”|auto|32px|auto||” custom_padding=”24px|24px|24px|24px|false|false” border_radii=”on|12px|12px|12px|12px” border_width_all=”1px” border_color_all=”#efefef” box_shadow_style=”preset3″ box_shadow_color=”rgba(0,0,0,0.09)” locked=”off” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.18.0″ _module_preset=”default” custom_css_main_element=”width: 20% !important” global_colors_info=”{}”][et_pb_image src=”https:\/\/www.propelex.com\/wp-content\/uploads\/2022\/11\/ptmobile5.svg” title_text=”ptmobile5″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.18.0″ _module_preset=”default” custom_css_main_element=”width: 80% !important” global_colors_info=”{}”][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” header_font=”|300|||||||” header_font_size=”20px” header_3_font_size=”20px” header_4_font=”Inter|300|||||||” header_4_font_size=”20px” custom_margin=”20px|||||” custom_margin_tablet=”20px|||||” custom_margin_phone=”13px||||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|||24px|false|false” global_colors_info=”{}”]<\/p>\n

          Reporting<\/h4>\n

          [\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.18.0″ _module_preset=”default” background_image=”https:\/\/www.propelex.com\/wp-content\/uploads\/2022\/11\/image.png” background_size=”custom” background_image_width=”100%” background_position=”top_center” custom_padding=”30px|||||” locked=”off” global_colors_info=”{}”][et_pb_row _builder_version=”4.18.0″ _module_preset=”default” width=”auto” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_font=”|300|||||||” text_text_color=”gcid-d69e7c30-8093-414c-91fd-8411e56f2ea9″ text_font_size=”16px” text_line_height=”1.6em” max_width_tablet=”90%” max_width_phone=”90%” max_width_last_edited=”on|phone” custom_margin=”|80px||80px|false|false” custom_margin_tablet=”|80px||80px|false|false” custom_margin_phone=”|0px||0px|false|false” custom_margin_last_edited=”on|phone” custom_padding=”||||false|false” module_alignment_tablet=”” module_alignment_phone=”center” module_alignment_last_edited=”on|phone” global_colors_info=”{%22gcid-d69e7c30-8093-414c-91fd-8411e56f2ea9%22:%91%22text_text_color%22%93}”]<\/p>\n

          Identify organization\u2019s exploitable security vulnerabilities through a systematic process. Understand overall health of your network, application, mobile, cloud & physical controls.<\/p>\n

          [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.18.0″ _module_preset=”default” custom_margin=”70px|auto||auto|false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” header_2_font=”|300|||||||” header_2_text_align=”center” header_2_font_size=”50px” header_4_font=”|300|||||||” header_4_text_align=”center” header_4_font_size=”40px” header_2_font_size_tablet=”40px” header_2_font_size_phone=”40px” header_2_font_size_last_edited=”on|desktop” global_colors_info=”{%22gcid-d69e7c30-8093-414c-91fd-8411e56f2ea9%22:%91%22text_text_color%22,%22text_text_color%22%93,%22gcid-337d421c-6fe7-441a-89a0-a2e41b885893%22:%91%22header_text_color%22,%22header_text_color%22%93}”]<\/p>\n

          Risk Rating Methodology<\/h2>\n

          [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_4,1_4,1_4,1_4″ make_equal=”on” disabled_on=”on|on|on” _builder_version=”4.18.0″ _module_preset=”default” custom_margin=”|auto|64px|auto|false|false” disabled=”on” global_colors_info=”{}”][et_pb_column type=”1_4″ _builder_version=”4.18.0″ _module_preset=”default” background_color=”#FFFFFF” custom_padding=”0px|24px|40px|24px|false|false” border_radii=”on|12px|12px|12px|12px” box_shadow_style=”preset3″ box_shadow_color=”rgba(0,0,0,0.14)” global_colors_info=”{}”][et_pb_code _builder_version=”4.18.0″ _module_preset=”default” custom_margin=”||||false|false” global_colors_info=”{}”]<\/p>\n

          \t<\/p>\n
          <\/div>\n

          <\/div>\n

          [\/et_pb_code][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_font=”|600|||||||” text_text_color=”gcid-4d3666a6-fd9a-41d7-b68d-ac0cd6ae68ca” text_orientation=”center” custom_margin=”64px||0px||false|false” global_colors_info=”{%22gcid-4d3666a6-fd9a-41d7-b68d-ac0cd6ae68ca%22:%91%22text_text_color%22%93}”]<\/p>\n

          01<\/p>\n

          [\/et_pb_text][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” header_5_font=”|300|||||||” header_5_text_align=”center” header_5_font_size=”28px” custom_margin=”||0px||false|false” global_colors_info=”{}”]<\/p>\n

          Threat Agent Factors<\/h5>\n

          [\/et_pb_text][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_font=”|300|||||||” global_colors_info=”{}”]<\/p>\n

            \n
          • Skill Level<\/li>\n
          • Motive<\/li>\n
          • Opportunity<\/li>\n
          • Size<\/li>\n<\/ul>\n

            [\/et_pb_text][\/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.18.0″ _module_preset=”default” background_color=”#FFFFFF” custom_padding=”0px|24px|40px|24px|false|false” border_radii=”on|12px|12px|12px|12px” box_shadow_style=”preset3″ box_shadow_color=”rgba(0,0,0,0.14)” global_colors_info=”{}”][et_pb_code _builder_version=”4.18.0″ _module_preset=”default” custom_margin=”||||false|false” global_colors_info=”{}”]<\/p>\n

            \t<\/p>\n
            <\/div>\n

            <\/div>\n

            [\/et_pb_code][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_font=”|600|||||||” text_text_color=”gcid-4d3666a6-fd9a-41d7-b68d-ac0cd6ae68ca” text_orientation=”center” custom_margin=”64px||0px||false|false” global_colors_info=”{%22gcid-4d3666a6-fd9a-41d7-b68d-ac0cd6ae68ca%22:%91%22text_text_color%22%93}”]<\/p>\n

            02<\/p>\n

            [\/et_pb_text][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” header_5_font=”|300|||||||” header_5_text_align=”center” header_5_font_size=”28px” custom_margin=”||0px||false|false” global_colors_info=”{}”]<\/p>\n

            Vulnerability Factors<\/h5>\n

            [\/et_pb_text][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_font=”|300|||||||” text_orientation=”center” global_colors_info=”{}”]<\/p>\n

            Ease of Discovery
            \nEase of Exploit
            \nAwareness
            \nIntrusion Detection<\/p>\n

            [\/et_pb_text][\/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.18.0″ _module_preset=”default” background_color=”#FFFFFF” custom_padding=”0px|24px|40px|24px|false|false” border_radii=”on|12px|12px|12px|12px” box_shadow_style=”preset3″ box_shadow_color=”rgba(0,0,0,0.14)” global_colors_info=”{}”][et_pb_code _builder_version=”4.18.0″ _module_preset=”default” custom_margin=”||||false|false” global_colors_info=”{}”]<\/p>\n

            \t<\/p>\n
            <\/div>\n

            <\/div>\n

            [\/et_pb_code][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_font=”|600|||||||” text_text_color=”gcid-4d3666a6-fd9a-41d7-b68d-ac0cd6ae68ca” text_orientation=”center” custom_margin=”64px||0px||false|false” global_colors_info=”{%22gcid-4d3666a6-fd9a-41d7-b68d-ac0cd6ae68ca%22:%91%22text_text_color%22%93}”]<\/p>\n

            03<\/p>\n

            [\/et_pb_text][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” header_5_font=”|300|||||||” header_5_text_align=”center” header_5_font_size=”28px” custom_margin=”||0px||false|false” global_colors_info=”{}”]<\/p>\n

            Technical Impact Factors<\/h5>\n

            [\/et_pb_text][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_font=”|300|||||||” text_orientation=”center” global_colors_info=”{}”]<\/p>\n

            Loss of Confidentiality
            \nLoss of Integrity
            \nLoss of Avalability
            \nLoss of Accountability<\/p>\n

            [\/et_pb_text][\/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.18.0″ _module_preset=”default” background_color=”#FFFFFF” custom_padding=”0px|24px|40px|24px|false|false” border_radii=”on|12px|12px|12px|12px” box_shadow_style=”preset3″ box_shadow_color=”rgba(0,0,0,0.14)” global_colors_info=”{}”][et_pb_code _builder_version=”4.18.0″ _module_preset=”default” custom_margin=”||||false|false” global_colors_info=”{}”]<\/p>\n

            \t<\/p>\n
            <\/div>\n

            <\/div>\n

            [\/et_pb_code][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_font=”|600|||||||” text_text_color=”gcid-4d3666a6-fd9a-41d7-b68d-ac0cd6ae68ca” text_orientation=”center” custom_margin=”64px||0px||false|false” global_colors_info=”{%22gcid-4d3666a6-fd9a-41d7-b68d-ac0cd6ae68ca%22:%91%22text_text_color%22%93}”]<\/p>\n

            03<\/p>\n

            [\/et_pb_text][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” header_5_font=”|300|||||||” header_5_text_align=”center” header_5_font_size=”28px” custom_margin=”||0px||false|false” global_colors_info=”{}”]<\/p>\n

            Opportunities<\/h5>\n

            [\/et_pb_text][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_font=”|300|||||||” text_orientation=”center” global_colors_info=”{}”]<\/p>\n

            Financial Damage
            \nReputation Damage
            \nNon-compliance
            \nPrivacy Violation<\/p>\n

            [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_4,1_4,1_4,1_4″ make_equal=”on” _builder_version=”4.18.0″ _module_preset=”default” module_alignment=”center” custom_margin=”|auto|64px|auto|false|false” global_colors_info=”{}”][et_pb_column type=”1_4″ _builder_version=”4.18.0″ _module_preset=”default” background_color=”#FFFFFF” custom_padding=”0px|24px|40px|24px|false|false” custom_padding_tablet=”0px|24px|40px|24px|false|false” custom_padding_phone=”0px|24px|40px|24px|false|false” custom_padding_last_edited=”on|desktop” border_radii=”on|12px|12px|12px|12px” border_width_left=”6px” border_color_left=”gcid-0ae661e1-b78f-4235-b84a-d66578ad2cd3″ box_shadow_style=”preset3″ box_shadow_color=”rgba(0,0,0,0.14)” global_colors_info=”{%22gcid-0ae661e1-b78f-4235-b84a-d66578ad2cd3%22:%91%22border_color_left%22%93}”][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_font=”|600|||||||” text_text_color=”gcid-4d3666a6-fd9a-41d7-b68d-ac0cd6ae68ca” custom_margin=”52px||0px||false|false” global_colors_info=”{%22gcid-4d3666a6-fd9a-41d7-b68d-ac0cd6ae68ca%22:%91%22text_text_color%22%93}”]<\/p>\n

            01<\/p>\n

            [\/et_pb_text][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” header_text_align=”left” header_5_font=”|300|||||||” header_5_text_align=”left” header_5_font_size=”25px” custom_margin=”||0px||false|false” global_colors_info=”{}”]<\/p>\n

            Threat Agent Factors<\/h5>\n

            [\/et_pb_text][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_font=”|300|||||||” global_colors_info=”{}”]<\/p>\n

              \n
            • Skill Level<\/li>\n
            • Motive<\/li>\n
            • Opportunity<\/li>\n
            • Size<\/li>\n<\/ul>\n

              [\/et_pb_text][\/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.18.0″ _module_preset=”default” background_color=”#FFFFFF” custom_padding=”0px|24px|40px|24px|false|false” border_radii=”on|12px|12px|12px|12px” border_width_left=”6px” border_color_left=”gcid-9e1f3c18-3017-4ba8-a307-291d1ae2b5bc” box_shadow_style=”preset3″ box_shadow_color=”rgba(0,0,0,0.14)” global_colors_info=”{%22gcid-9e1f3c18-3017-4ba8-a307-291d1ae2b5bc%22:%91%22border_color_left%22%93}”][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_font=”|600|||||||” text_text_color=”gcid-4d3666a6-fd9a-41d7-b68d-ac0cd6ae68ca” custom_margin=”52px||0px||false|false” global_colors_info=”{%22gcid-4d3666a6-fd9a-41d7-b68d-ac0cd6ae68ca%22:%91%22text_text_color%22%93}”]<\/p>\n

              02<\/p>\n

              [\/et_pb_text][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” header_5_font=”|300|||||||” header_5_text_align=”left” header_5_font_size=”25px” custom_margin=”||0px||false|false” global_colors_info=”{}”]<\/p>\n

              Vulnerability Factors<\/h5>\n

              [\/et_pb_text][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_font=”|300|||||||” global_colors_info=”{}”]<\/p>\n

                \n
              • Ease of Discovery<\/li>\n
              • Ease of Exploit<\/li>\n
              • Awareness<\/li>\n
              • Intrusion Detection<\/li>\n<\/ul>\n

                [\/et_pb_text][\/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.18.0″ _module_preset=”default” background_color=”#FFFFFF” custom_padding=”0px|24px|40px|24px|false|false” border_radii=”on|12px|12px|12px|12px” border_width_left=”6px” border_color_left=”gcid-da9cc38e-de3b-41ed-a83e-ff8f5282cace” box_shadow_style=”preset3″ box_shadow_color=”rgba(0,0,0,0.14)” global_colors_info=”{%22gcid-da9cc38e-de3b-41ed-a83e-ff8f5282cace%22:%91%22border_color_left%22%93}”][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_font=”|600|||||||” text_text_color=”gcid-4d3666a6-fd9a-41d7-b68d-ac0cd6ae68ca” custom_margin=”52px||0px||false|false” global_colors_info=”{%22gcid-4d3666a6-fd9a-41d7-b68d-ac0cd6ae68ca%22:%91%22text_text_color%22%93}”]<\/p>\n

                03<\/p>\n

                [\/et_pb_text][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” header_font_size=”24px” header_5_font=”|300|||||||” header_5_text_align=”left” header_5_font_size=”25px” custom_margin=”||0px||false|false” global_colors_info=”{}”]<\/p>\n

                Technical Impact Factors<\/h5>\n

                [\/et_pb_text][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_font=”|300|||||||” global_colors_info=”{}”]<\/p>\n

                  \n
                • Loss of Confidentiality<\/li>\n
                • Loss of Integrity<\/li>\n
                • Loss of Availability<\/li>\n
                • Loss of Accountability<\/li>\n<\/ul>\n

                  [\/et_pb_text][\/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.18.0″ _module_preset=”default” background_color=”#FFFFFF” custom_padding=”0px|24px|40px|24px|false|false” border_radii=”on|12px|12px|12px|12px” border_color_all=”gcid-a1c5f881-b92f-445a-8bba-fd0b78cff796″ border_width_left=”6px” box_shadow_style=”preset3″ box_shadow_color=”rgba(0,0,0,0.14)” global_colors_info=”{%22gcid-a1c5f881-b92f-445a-8bba-fd0b78cff796%22:%91%22border_color_all%22%93}”][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_font=”|600|||||||” text_text_color=”gcid-4d3666a6-fd9a-41d7-b68d-ac0cd6ae68ca” custom_margin=”52px||0px||false|false” global_colors_info=”{%22gcid-4d3666a6-fd9a-41d7-b68d-ac0cd6ae68ca%22:%91%22text_text_color%22%93}”]<\/p>\n

                  04<\/p>\n

                  [\/et_pb_text][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” header_5_font=”|300|||||||” header_5_text_align=”left” header_5_font_size=”25px” custom_margin=”||0px||false|false” global_colors_info=”{}”]<\/p>\n

                  Opportunities<\/h5>\n

                  [\/et_pb_text][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_font=”|300|||||||” global_colors_info=”{}”]<\/p>\n

                    \n
                  • Financial Damage<\/li>\n
                  • Reputation Damage<\/li>\n
                  • Non-compliance<\/li>\n
                  • Privacy Violation<\/li>\n<\/ul>\n

                    [\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.18.0″ _module_preset=”default” custom_padding=”0px||||false|false” global_colors_info=”{}”][et_pb_row _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” header_2_font=”|300|||||||” header_2_text_align=”center” header_2_font_size=”40px” header_4_font=”|300|||||||” header_4_text_align=”center” header_4_font_size=”40px” header_2_font_size_tablet=”40px” header_2_font_size_phone=”40px” header_2_font_size_last_edited=”on|desktop” global_colors_info=”{}”]<\/p>\n

                    Case Studies<\/h2>\n

                     <\/p>\n

                    [\/et_pb_text][difl_cptgrid post_type=”resources” posts_number=”3″ post_display=”by_tax” tax_for_resources=”layout_tag” resources_terms_layout_tag=”39″ gutter=”56″ column_tablet=”1″ column_phone=”1″ column_last_edited=”on|phone” _builder_version=”4.18.0″ _module_preset=”default” border_radii_item_outer=”on|12px|12px|12px|12px” box_shadow_style_item_outer=”preset3″ box_shadow_color_item_outer=”rgba(0,0,0,0.12)” global_colors_info=”{}”][difl_cptitem type=”image” _builder_version=”4.18.0″ _module_preset=”default” max_height=”160px” global_colors_info=”{}”][\/difl_cptitem][difl_cptitem type=”taxonomy” post_type=”resource_items” element_padding=”8px|24px||24px|false|true” _builder_version=”4.18.0″ _module_preset=”default” body_font=”|600|||||||” body_text_color=”#999999″ global_colors_info=”{}”][\/difl_cptitem][difl_cptitem type=”title” element_padding=”|24px||24px|false|true” _builder_version=”4.18.0″ _module_preset=”default” body_font=”|300|||||||” body_text_color=”#0d152d” body_font_size=”24px” body_line_height=”1.2em” global_colors_info=”{}”][\/difl_cptitem][difl_cptitem type=”content” use_post_excrpt=”on” element_padding=”|24px||24px|false|true” _builder_version=”4.18.0″ _module_preset=”default” body_font=”|300|||||||” global_colors_info=”{}”][\/difl_cptitem][difl_cptitem type=”button” element_margin=”||24px||false|false” element_padding=”|24px||24px|false|true” _builder_version=”4.18.0″ _module_preset=”default” body_text_color=”#495566″ global_colors_info=”{}”][\/difl_cptitem][\/difl_cptgrid][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.18.0″ _module_preset=”default” custom_margin=”0px||||false|false” custom_padding=”0px||||false|false” global_colors_info=”{}”][et_pb_row column_structure=”1_3,2_3″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_font=”|300|||||||” text_text_color=”gcid-a75aac2a-255e-4051-a481-ea46b0a41137″ text_font_size=”16px” header_font=”|300|||||||” header_text_color=”gcid-2807c2c4-36f6-4176-bc2a-836a3643cd0c” header_font_size=”48px” header_2_font=”|300|||||||” header_2_text_color=”#0d152d” header_2_font_size=”48px” header_4_font=”|300|||||||” header_4_text_color=”#999999″ header_4_font_size=”16px” locked=”off” global_colors_info=”{%22gcid-2807c2c4-36f6-4176-bc2a-836a3643cd0c%22:%91%22header_text_color%22,%22header_text_color%22,%22header_text_color%22,%22header_text_color%22%93,%22gcid-a75aac2a-255e-4051-a481-ea46b0a41137%22:%91%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22%93}”]<\/p>\n

                    FAQs<\/h2>\n

                    Let us help you with any inquiry you might have.<\/p>\n

                    [\/et_pb_text][\/et_pb_column][et_pb_column type=”2_3″ _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_accordion _builder_version=”4.18.0″ _module_preset=”default” toggle_text_color=”#FFFFFF” toggle_font_size=”16px” body_font=”||||||||” body_text_color=”gcid-4d3666a6-fd9a-41d7-b68d-ac0cd6ae68ca” background_color=”RGBA(255,255,255,0)” locked=”off” global_colors_info=”{%22gcid-4d3666a6-fd9a-41d7-b68d-ac0cd6ae68ca%22:%91%22body_text_color%22%93}”][et_pb_accordion_item title=”What is Penetration Testing and How Does It Work?” open=”on” open_toggle_text_color=”gcid-2807c2c4-36f6-4176-bc2a-836a3643cd0c” _builder_version=”4.18.0″ _module_preset=”default” body_text_color=”gcid-a75aac2a-255e-4051-a481-ea46b0a41137″ background_color=”RGBA(255,255,255,0)” background_enable_color=”on” custom_margin=”0px||12px||false|false” custom_padding=”0px||16px||false|false” border_width_all=”0px” border_width_bottom=”1px” border_color_bottom=”gcid-3b1a23ff-0b85-4467-9578-78e72f47b422″ global_colors_info=”{%22gcid-3b1a23ff-0b85-4467-9578-78e72f47b422%22:%91%22border_color_bottom%22%93,%22gcid-2807c2c4-36f6-4176-bc2a-836a3643cd0c%22:%91%22open_toggle_text_color%22,%22toggle_text_color%22%93,%22gcid-a75aac2a-255e-4051-a481-ea46b0a41137%22:%91%22body_text_color%22%93}” toggle_text_color=”gcid-2807c2c4-36f6-4176-bc2a-836a3643cd0c” toggle_font=”|300|||||||”]<\/p>\n

                    Penetration testing is a way to detect and resolve weaknesses within an organization’s information security. The process simulates real-world attacks and attempts by hackers to compromise an organization’s systems. By discovering vulnerabilities and identifying their effects, a company can prevent future breaches and exploitation.<\/span><\/p>\n

                    A penetration test can involve testing a network, internal or external application, or website. It can conduct manually or via an automated system. Generally, the process takes one to two weeks.<\/span><\/p>\n

                    During the test, a security expert will work on the target computer system or network to identify and evaluate vulnerabilities. The tester may also provide advice on how to remediate the flaws. This allows a decision maker to make a more informed decision about the best course of action for the organization.<\/span><\/p>\n

                    Pen tests can do to examine the cybersecurity architecture of a business, or to assess the value of a business’s sensitive data. Ethical hackers, or white hackers, are hire to perform the testing. They often take on the role of an employee or vendor who has compromised in a phishing attack.<\/span><\/p>\n

                    In addition to spotting potential risks, a penetration test will also help you determine whether an attacker can remain a persistent presence in your network. Using the results of a penetration test, you can find ways to expel intruders and keep them from gaining access.<\/span><\/p>\n

                    [\/et_pb_accordion_item][et_pb_accordion_item title=”Why is Penetration Important?” open_toggle_text_color=”gcid-2807c2c4-36f6-4176-bc2a-836a3643cd0c” _builder_version=”4.18.0″ _module_preset=”default” body_text_color=”gcid-a75aac2a-255e-4051-a481-ea46b0a41137″ background_color=”RGBA(255,255,255,0)” background_enable_color=”on” custom_margin=”0px||12px||false|false” custom_padding=”0px||16px||false|false” border_width_all=”0px” border_width_bottom=”1px” border_color_bottom=”gcid-3b1a23ff-0b85-4467-9578-78e72f47b422″ global_colors_info=”{%22gcid-3b1a23ff-0b85-4467-9578-78e72f47b422%22:%91%22border_color_bottom%22%93,%22gcid-2807c2c4-36f6-4176-bc2a-836a3643cd0c%22:%91%22open_toggle_text_color%22,%22toggle_text_color%22%93,%22gcid-a75aac2a-255e-4051-a481-ea46b0a41137%22:%91%22body_text_color%22%93}” toggle_text_color=”gcid-2807c2c4-36f6-4176-bc2a-836a3643cd0c” toggle_font=”|300|||||||” open=”off”]<\/p>\n

                    Performing a penetration test is one of the best ways to protect your organization from hackers. It also helps you understand how secure your IT infrastructure is.<\/span><\/p>\n

                    Penetration testing can provide a number of benefits, from finding weak spots in your system to improving your security protocol. This testing can do manually or automated.<\/span><\/p>\n

                    Another advantage of performing a penetrative test is that it can help you comply with industry regulations. In fact, penetration testing usually carried out by financial services organizations.<\/span><\/p>\n

                    [\/et_pb_accordion_item][et_pb_accordion_item title=”How Frequently Should We Use Penetration Testing Services?” open_toggle_text_color=”gcid-2807c2c4-36f6-4176-bc2a-836a3643cd0c” _builder_version=”4.18.0″ _module_preset=”default” body_text_color=”gcid-a75aac2a-255e-4051-a481-ea46b0a41137″ background_color=”RGBA(255,255,255,0)” background_enable_color=”on” custom_margin=”0px||12px||false|false” custom_padding=”0px||16px||false|false” border_width_all=”0px” border_width_bottom=”1px” border_color_bottom=”gcid-3b1a23ff-0b85-4467-9578-78e72f47b422″ global_colors_info=”{%22gcid-3b1a23ff-0b85-4467-9578-78e72f47b422%22:%91%22border_color_bottom%22%93,%22gcid-2807c2c4-36f6-4176-bc2a-836a3643cd0c%22:%91%22open_toggle_text_color%22,%22toggle_text_color%22%93,%22gcid-a75aac2a-255e-4051-a481-ea46b0a41137%22:%91%22body_text_color%22%93}” toggle_text_color=”gcid-2807c2c4-36f6-4176-bc2a-836a3643cd0c” toggle_font=”|300|||||||” open=”off”]<\/p>\n

                    The best way to determine the frequency of your tests is to figure out your company’s risk assessment. Some companies will perform a penetration test once or twice a year. Others may have a more aggressive schedule. There are different rules and regulations for each type of organization.<\/p>\n

                    A thorough security assessment can also help you make informed resource allocations. Whether you’re planning on performing a simple configuration change or a large architectural overhaul, it’s a good idea to conduct a security audit before committing to a costly change.<\/p>\n

                    There are many factors to consider when determining the right time for your pen test. You need to know your resources, your budget, and your current environment.<\/p>\n

                    [\/et_pb_accordion_item][et_pb_accordion_item title=”How Important is the Red Team in Cyber Security?” open_toggle_text_color=”gcid-2807c2c4-36f6-4176-bc2a-836a3643cd0c” _builder_version=”4.18.0″ _module_preset=”default” body_text_color=”gcid-a75aac2a-255e-4051-a481-ea46b0a41137″ background_color=”RGBA(255,255,255,0)” background_enable_color=”on” custom_margin=”0px||12px||false|false” custom_padding=”0px||16px||false|false” border_width_all=”0px” border_width_bottom=”1px” border_color_bottom=”gcid-3b1a23ff-0b85-4467-9578-78e72f47b422″ global_colors_info=”{%22gcid-3b1a23ff-0b85-4467-9578-78e72f47b422%22:%91%22border_color_bottom%22%93,%22gcid-2807c2c4-36f6-4176-bc2a-836a3643cd0c%22:%91%22open_toggle_text_color%22,%22toggle_text_color%22%93,%22gcid-a75aac2a-255e-4051-a481-ea46b0a41137%22:%91%22body_text_color%22%93}” toggle_text_color=”gcid-2807c2c4-36f6-4176-bc2a-836a3643cd0c” toggle_font=”|300|||||||” open=”off”]<\/p>\n

                    The Red Team is an important part of any cyber security program. They help to identify vulnerabilities and provide valuable information to improve system and network security. <\/span><\/p>\n

                    Red teams use a variety of methods to identify vulnerabilities in your network. These include social engineering, reverse engineering, and penetration testing.<\/span><\/p>\n

                    In a well-executed red teaming operation, the organization will take into account the scale of its systems, the threats it faces in particular industries, and how effective its current defenses are. Typically, red teaming exercises involve mapping out assets and processes, as well as exposing weaknesses in infrastructure and workflows.<\/span><\/p>\n

                    [\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"

                    Propelex read team penetration testing services combine security experts and technologies to deliver security outcomes for your on-premise and cloud environments<\/p>\n","protected":false},"author":1,"featured_media":2224,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":"","_links_to":"","_links_to_target":""},"acf":[],"yoast_head":"\nPenetration Testing Services- Cloud, Apps, Mobile & Network<\/title>\n<meta name=\"description\" content=\"Propelex read team penetration testing services combine security experts and technologies to deliver security outcomes for your on-premise and cloud environments\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.propelex.com\/penetration-testing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Penetration Testing Services- Cloud, Apps, Mobile & Network\" \/>\n<meta property=\"og:description\" content=\"Propelex read team penetration testing services combine security experts and technologies to deliver security outcomes for your on-premise and cloud environments\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.propelex.com\/penetration-testing\/\" \/>\n<meta property=\"og:site_name\" content=\"Propelex\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-30T15:52:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.propelex.com\/wp-content\/uploads\/2023\/01\/penetration-testing@2x-80.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1241\" \/>\n\t<meta property=\"og:image:height\" content=\"801\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.propelex.com\/penetration-testing\/\",\"url\":\"https:\/\/www.propelex.com\/penetration-testing\/\",\"name\":\"Penetration Testing Services- Cloud, Apps, Mobile & Network\",\"isPartOf\":{\"@id\":\"https:\/\/www.propelex.com\/#website\"},\"datePublished\":\"2022-11-02T18:54:46+00:00\",\"dateModified\":\"2023-08-30T15:52:23+00:00\",\"description\":\"Propelex read team penetration testing services combine security experts and technologies to deliver security outcomes for your on-premise and cloud environments\",\"breadcrumb\":{\"@id\":\"https:\/\/www.propelex.com\/penetration-testing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.propelex.com\/penetration-testing\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.propelex.com\/penetration-testing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.propelex.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Penetration testing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.propelex.com\/#website\",\"url\":\"https:\/\/www.propelex.com\/\",\"name\":\"Propelex\",\"description\":\"Business focused cybersecurity\",\"publisher\":{\"@id\":\"https:\/\/www.propelex.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.propelex.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.propelex.com\/#organization\",\"name\":\"Propelex\",\"url\":\"https:\/\/www.propelex.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.propelex.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.propelex.com\/wp-content\/uploads\/2022\/11\/propelex-logo-footer.svg\",\"contentUrl\":\"https:\/\/www.propelex.com\/wp-content\/uploads\/2022\/11\/propelex-logo-footer.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"Propelex\"},\"image\":{\"@id\":\"https:\/\/www.propelex.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Penetration Testing Services- Cloud, Apps, Mobile & Network","description":"Propelex read team penetration testing services combine security experts and technologies to deliver security outcomes for your on-premise and cloud environments","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.propelex.com\/penetration-testing\/","og_locale":"en_US","og_type":"article","og_title":"Penetration Testing Services- Cloud, Apps, Mobile & Network","og_description":"Propelex read team penetration testing services combine security experts and technologies to deliver security outcomes for your on-premise and cloud environments","og_url":"https:\/\/www.propelex.com\/penetration-testing\/","og_site_name":"Propelex","article_modified_time":"2023-08-30T15:52:23+00:00","og_image":[{"width":1241,"height":801,"url":"https:\/\/www.propelex.com\/wp-content\/uploads\/2023\/01\/penetration-testing@2x-80.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.propelex.com\/penetration-testing\/","url":"https:\/\/www.propelex.com\/penetration-testing\/","name":"Penetration Testing Services- Cloud, Apps, Mobile & Network","isPartOf":{"@id":"https:\/\/www.propelex.com\/#website"},"datePublished":"2022-11-02T18:54:46+00:00","dateModified":"2023-08-30T15:52:23+00:00","description":"Propelex read team penetration testing services combine security experts and technologies to deliver security outcomes for your on-premise and cloud environments","breadcrumb":{"@id":"https:\/\/www.propelex.com\/penetration-testing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.propelex.com\/penetration-testing\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.propelex.com\/penetration-testing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.propelex.com\/"},{"@type":"ListItem","position":2,"name":"Penetration testing"}]},{"@type":"WebSite","@id":"https:\/\/www.propelex.com\/#website","url":"https:\/\/www.propelex.com\/","name":"Propelex","description":"Business focused cybersecurity","publisher":{"@id":"https:\/\/www.propelex.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.propelex.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.propelex.com\/#organization","name":"Propelex","url":"https:\/\/www.propelex.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.propelex.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.propelex.com\/wp-content\/uploads\/2022\/11\/propelex-logo-footer.svg","contentUrl":"https:\/\/www.propelex.com\/wp-content\/uploads\/2022\/11\/propelex-logo-footer.svg","width":"1024","height":"1024","caption":"Propelex"},"image":{"@id":"https:\/\/www.propelex.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.propelex.com\/wp-json\/wp\/v2\/pages\/15"}],"collection":[{"href":"https:\/\/www.propelex.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.propelex.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.propelex.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.propelex.com\/wp-json\/wp\/v2\/comments?post=15"}],"version-history":[{"count":48,"href":"https:\/\/www.propelex.com\/wp-json\/wp\/v2\/pages\/15\/revisions"}],"predecessor-version":[{"id":3573,"href":"https:\/\/www.propelex.com\/wp-json\/wp\/v2\/pages\/15\/revisions\/3573"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.propelex.com\/wp-json\/wp\/v2\/media\/2224"}],"wp:attachment":[{"href":"https:\/\/www.propelex.com\/wp-json\/wp\/v2\/media?parent=15"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}