Penetration Testing and Vulnerability Assessments

Reduce your risk of breaches

Penetration testing and vulnerability assessments play an important role in identifying network vulnerabilities that could be exploited by a hacker and lead to a breach. We can help your company reduce the chance of a breach.

Our solutions

We provide penetration testing and vulnerability assessment services that can help your company reduce the risk of the significant financial, operational, and reputational losses that can result from a breach. Upon completion of our assessment, we will provide a detailed report with key findings, vulnerabilities, and remediation techniques to enhance your company’s security and regulatory posture.

Vulnerability Scanning

We perform an automated scan of your environment that detects vulnerabilities that could potentially be used by an attacker to exploit your network.

External Penetration Testing

We will use controlled real-world attack vectors to exploit the vulnerabilities found on your network and identify key weaknesses that could lead to a cyber-attack.

Internal Penetration Testing

Our credentialed ethical hackers will identify vulnerabilities in your network and attempt to exploit them to see how far a potential attacker could go and what sensitive information could be compromised.

1 of

Additional testing services

Physical Office Security Penetration

This test assesses the strength of the physical security controls in your data center, offices, etc.

Wireless LAN Testing

This test assesses whether your wireless local area network meets security and performance requirements

Social Engineering

We use social manipulation techniques to identify the types of information that can be extracted by an attacker prior to an attack.

 

Microsoft® Office 365® External Access Testing

We validate conditional access policies and multi-factor protections in your Office 365 environment.

1 of

News

Michael Borts joins ACA Group as the new Chief Technology Officer

Michael Borts has joined the firm as Chief Technology Officer (CTO) to lead ACA’s technology development, vision, and strategy. In his role, he will oversee all product development for ACA’s award-winning ComplianceAlpha® regulatory technology platform and technology enablement at the firm.

ACA Group Acquires Catelas to Create Industry-first 360 Surveillance Offering

The acquisition of Catelas further enhances the holistic surveillance capabilities of ACA’s RegTech platform. Catelas’ patented technology automates the mapping of how people connect and form groups within a firm, isolates collusion risk, and detects high-risk behaviors.

ACA Group and the Investment Adviser Association Announce Strategic Partnership

ACA Group (ACA), a leading provider of governance, risk, and compliance (GRC) advisory services and technology solutions, today announced that it has entered into a strategic partnership with the Investment Adviser Association (IAA), a leading organization dedicated to advancing the interests of investment advisers.

Upcoming events

Lessons Learned from 2021's Scariest Cyber Breaches

The dramatic increase in sophistication and global reach of cyber incidents in 2021 has led cybersecurity to be a growing concern for organizations of all sizes. Join us for the horrifying retelling of the scariest cyber incidents of the past year.

Webcast

Get Ready to Comply: SEC Marketing Rule Preparation Timeline

The compliance date for the SEC's New Marketing Rule is November 4, 2022. With 1 year to go, ACA’s team of experts have put together a suggested preparation timeline guide to help firms prepare to implement the changes necessary to comply.

Webcast