FAQ

Frequently Asked Questions

How can I purchase Damocles products?

Damocles Security products are exclusively available through our partner network. To ensure you receive comprehensive support and service, purchasing our products directly from our partners is required. This approach helps us maintain high-quality service and support across all touchpoints​ (Damocles Security)​.

How does Damocles ensure the confidentiality of my data during penetration testing?

Damocles Security takes stringent measures to protect your data during penetration testing, ensuring confidentiality and integrity. We use the advanced Palo Alto Next-Generation Firewalls (NGFW) as a key component of our security infrastructure, providing robust protection against potential breaches by filtering traffic and preventing unauthorized access.

 

Additionally, our Svalinn service plays a critical role in safeguarding data. It’s a comprehensive web application firewall hosted securely within Australian borders, ensuring that all data remains under local jurisdiction and is protected according to Australian data protection standards. You can find more details about Svalinn here.

 

Our secure data centers are located within Australia, featuring high-security measures to physically protect the servers and the data they hold. These facilities are monitored 24/7, and access is strictly controlled to prevent any unauthorized entry or data exposure.

 

Moreover, the Damocles Security Operations Center (SOC) actively monitors cybersecurity threats around the clock. Coupled with our Threat Detection and Response services, we provide continuous surveillance and rapid response to any suspicious activities or anomalies. This proactive monitoring and defense ensure that any potential threats are identified and mitigated swiftly, maintaining the security of your data throughout the testing process.

 

These combined layers of security technologies and operational practices ensure that your data is not only protected by leading-edge technology but is also overseen by expert security professionals dedicated to maintaining your data’s confidentiality and integrity.

What is the difference between a vulnerability assessment and a penetration test?

Vulnerability assessments and penetration tests are fundamental aspects of cybersecurity, each with distinct purposes. A vulnerability assessment aims to identify and list potential vulnerabilities in your systems, providing a broad security overview without active exploitation. In contrast, a penetration test actively exploits these vulnerabilities, mimicking an attacker’s approach to uncover how deeply your system can be compromised. This test is more focused and invasive, typically conducted annually or after significant system changes to validate the resilience of your infrastructure.

What is authenticated penetration testing?

Authenticated penetration testing involves the tester having valid credentials or insider access to the system being tested. This simulates an attack from someone with internal knowledge or compromised credentials.

What is the difference between authenticated and unauthenticated penetration testing?

Authenticated and unauthenticated penetration testing refer to the level of access and information provided to the security tester during the assessment.

What is unauthenticated penetration testing?

Unauthenticated penetration testing, on the other hand, does not involve any prior knowledge or credentials. The tester approaches the system as an external threat, attempting to exploit vulnerabilities without any special access privileges.

Can a combination of both testing methods be used?

Yes, a comprehensive security assessment often involves a combination of both authenticated and unauthenticated penetration testing. This provides a more holistic view of an organization’s security posture, addressing both internal and external threat scenarios.

Ask Questions