The SOKRA-NET LTD company offers providing the performance tests and security audits LAN, WAN, operating systems and applications.
We have prepared a detailed offer of services for a comprehensive safety concerning analysis IT systems.
The SOKRA-NET LTD company offers providing the performance tests and security audits LAN, WAN, operating systems and applications.
We have prepared a detailed offer of services for a comprehensive safety concerning analysis IT systems.
Performance testing, a non-functional testing technique performed to determine the system parameters in terms of responsiveness and stability under various workload. Performance testing measures the quality attributes of the system, such as scalability, reliability and resource usage.
Tests are performed using the “Rebellion” software system, which was created by engineers Sokra-NET. Rebellion in contrast to the known applications of this type, characterized by exceptional flexibility of configuration and the accuracy of the measurement times. During the test, we make the following measurements:
– Total time – total time from the start of the operation (before connecting) to end the call (after completion of receiving data from a web server). All times are counted in seconds to the nearest hundredth of a second.
– Connect time – time to connect (only includes establishing a TCP / IP)
– Pretransfer time – the time from the start of the operation to the completion of negotiations between the client and the server (includes negotiations SSL keys)
– Start-transfer time – the time from the start of operations to send the first byte to the customer
– Redirect time – the time from the start of the operation to the end of redirection (TT corresponds to the action, under which the redirect)
– Datasize – the amount of data transferred in a single operation (in bytes)
– Hits, the number of calls to a particular URL was
Penetration testing information systems’ security are intended to show the actual and potential errors in the architecture or configuration; the software and the use of computer networks which can be used by unauthorised people to destabilize the work of the company to obtain confidential information or data modification. For this purpose, the system under the test is subjected to a series of controlled attacks, simulating a real attempt to breach security and stability of networks using the Internet. Generally the attacks use both techniques and programs, and specialised tools. If you detect weaknesses in the system, we are ready to develop solutions for safer alternatives.
Comprehensive penetration tests include:
Once the threats and vulnerabilities have been evaluated, the penetration testing should address the risks identified throughout the environment. The penetration testing should be appropriate for the complexity and size of an organization. All locations of sensitive data; all key applications that store, process or transmit such data; all key network connections; and all key access points should be included. The penetration testing should attempt to exploit security vulnerabilities and weaknesses throughout the environment, attempting to penetrate both at the network level and key applications. The goal of penetration testing is to determine if unauthorized access to key systems and files can be achieved. If access is achieved, the vulnerability should be corrected and the penetration testing re-performed until the test is clean and no longer allows unauthorized access or other malicious activity.
Sokra-Net Resources Ltd – office at 590 Kingston Rd, London SW20 8DN, The United Kingdom,
registered in Companies House, number 94408448.
E-mail: office@sokra.net