A Ktec solution brings quality technology products, both hardware and software, to the Australian and New Zealand markets, through its extensive network of security partners.
Ktec's core competency lies in the area of Information Security, Acceleration and Content Management and brings to the market 'best of breed' solutions, supplied through the Security Technology Partners. With this approach, the company offers knowledge and skills into the supply chain to complement vendors and resellers, thus ensuring a complete and effective solution delivery to our Customers.
Our team of professional sales and technical staff is available to provide a high level of support and assistance in offering security solutions.
Ktec's value-added solution model targets those areas within Information Security that impact on business and show a justifiable return on investment. The company supports this vision with solutions from many world-leading suppliers.
Ktec's reputation is based on its customer service, responsiveness and ethical practice. We have the technical expertise and strong knowledge of today's technologies and an awareness of the future challenges faced by all organisations.
A Penetration Test simulates an attack on IT systems. During the testing the team attempt to find and exploit vulnerabilities to determine what information and access is able to be gained. This is designed to mimic the actions of an attacker exploiting weaknesses in network security without the usual risks.
Internal Penetration testing allows organisations to test, if an attacker had the equivalent of internal access how they may they may have access to perform unauthorised data disclosure, misuse, alteration or destruction of confidential information, including Non-Public Personal Information (NPPI).
The internal network, (file servers, workstations, etc.), of the organisation is exposed to threats such as external intruders, after breaching perimeter defences, or malicious insiders attempting to access or damage sensitive information or IT resources. Therefore organisations are encouraged to test the internal network at least as frequently as they do the external perimeter.
Best Practice recommends that each organisation perform an Internal Penetration Test as part of their regular Security Program in order to ensure the security of their internal network defenses.