Pentests - penetration tests
Security assessment of web applications and network infrastructure
Effective threat assessment method
Detailed test report
Qualified Atman experts
Broad scope of tests
Selection of methodology to satisfy clients’ needs
Cost optimization

Recent events and developments, as well as regular tests, provide for a more and more precise focus on cyber-attacks. They can affect not only big corporations, but also small firms where an increased hackers’ activity is reported. Regular penetration tests conducted for the IT infrastructure prove the best method to detect threats to our internal resources.


Pentests, being penetration tests, involve identification, analysis and assessment of the risk related to vulnerability to threats and security gaps. During penetration tests, our expert team conducts a controlled attack on a client’s ITC systems, with the aim being to provide a practical assessment of the system safety at the very moment. It is necessary to remind that a penetration test when conducted does not automatically involve security improvement. Upon presenting the results, it is necessary to implement suggestions and recommendations for the issues to be shot.

General Scope of Penetration Tests

Penetration tests can include, but are not limited to:

  • Safety tests of web and WWW server applications
  • Safety tests of network infrastructure
  • Risk related to the implementation of IoT solutions in the organization
  • Safety tests of mobile devices
  • Sociotechnical tests

The scope of services is determined on a single basis and depends upon the client’s needs and requirements.


When conducting tests, we perform not only strictly technical operations, like scanning, testing and verifying attack vulnerability, but also, if necessary, we interview selected persons who deal with systems and IT infrastructure elements indicated to be tested.

At the center of our tests there is a need to ensure that our clients are not exposed to any potential loss of their systems’ stability. Tests are conducted in compliance with applicable standards and based upon long-term experience acquired by our employees. This is why we do maintain a high standard of performed works, whilst following expectations of our business partners.

We can distinguish three basic models that are followed when performing penetration tests of IT systems and web applications:

"Blackbox” tests
Tasks are performed with minimum knowledge about a tested area, e.g. knowing only the clients’ address pool.
"Whitebox” tests
Our testers consult client’s teams and have access to the documentation concerning the examined IT area and persons who are responsible for maintenance and functioning of the client’s network
“Greybox” tests
Test models are used interchangeably; testers have a limited knowledge of tested systems and applications

The results of our works are presented in the report which contains a detailed analysis of threats detected during tests, including a manner of their elimination. Its elements include descriptive information and detailed technical data on the conducted tests and controlled attacks, as well as their results and recommendation to introduce changes. Due to the use of the data from penetration tests, administrators may consciously introduce corrections to the systems and networks, which actually allows a higher safety level to the entire infrastructure.

The know-how about an actual safety of the ITC infrastructure proves necessary to undertake any improving activities. The results of our works allow to precisely determine priorities related to IT modernization and maintenance and prove an excellent assistance when building a safe development strategy and operations of our clients’ businesses.

Ensuring efficiency and anti-DDoS protection for websites.
Check out our prices
Colocation Calculator
Check out the price of a customized service
Check out our prices
Internet Access
Business, Basic, Colo, Office - Select the most suitable solution for you company.
Enquire about an offer

This page uses cookie files to provide its services in accordance to Cookies Usage Policy. You can determine conditions of storing or access to cookie files in your web browser.