Logical Device Penetration

Identifying security flaws in new networked devices

For any organization looking to implement a new technology, the potential risks can be incredibly high. While new devices may offer financial incentives to encourage implementation, the potential vulnerabilities a device, both directly and indirectly, presents can outweigh any benefit. Testing how emerging threats can target new technology is challenging because existing security assessment tools are often not sufficient.

RSM's adaptive logical device penetration testing methodology identifies vulnerabilities within new systems, so they can be properly mitigated. In addition, we evaluate the associated risks not directly caused by the device, including network permissions, cloud communications and remote maintenance. Our framework follows an iterative process of initial discovery, followed by prototyping and testing to learn about the system in scope, then creating tools to target and attack the system and its communications.

This unique logical device penetration testing methodology must be followed because many systems use custom protocols, and so few off-the-shelf tools exist to test these systems. Throughout this process, RSM works to understand the business process the device is supporting, so that sample attacks can be tailored to the system.

By working with RSM, you can learn what your risks are with new technology, and how to prevent or mitigate them before putting them into use.