Penetration Testing and Vulnerability Assessments

Reduce your risk of breaches

Penetration testing and vulnerability assessments play an important role in identifying network vulnerabilities that could be exploited by a hacker and lead to a breach. We can help your company reduce the chance of a breach.

Our solutions

We provide penetration testing and vulnerability assessment services that can help your company reduce the risk of the significant financial, operational, and reputational losses that can result from a breach. Upon completion of our assessment, we will provide a detailed report with key findings, vulnerabilities, and remediation techniques to enhance your company’s security and regulatory posture.

Vulnerability Scanning

We perform an automated scan of your environment that detects vulnerabilities that could potentially be used by an attacker to exploit your network.

External Penetration Testing

We will use controlled real-world attack vectors to exploit the vulnerabilities found on your network and identify key weaknesses that could lead to a cyber-attack.

Internal Penetration Testing

Our credentialed ethical hackers will identify vulnerabilities in your network and attempt to exploit them to see how far a potential attacker could go and what sensitive information could be compromised.

1 of

Additional testing services

Physical Office Security Penetration

This test assesses the strength of the physical security controls in your data center, offices, etc.

Wireless LAN Testing

This test assesses whether your wireless local area network meets security and performance requirements

Social Engineering

We use social manipulation techniques to identify the types of information that can be extracted by an attacker prior to an attack.

 

Microsoft® Office 365® External Access Testing

We validate conditional access policies and multi-factor protections in your Office 365 environment.

1 of

News

Michael Borts joins ACA Group as the new Chief Technology Officer

Michael Borts has joined the firm as Chief Technology Officer (CTO) to lead ACA’s technology development, vision, and strategy. In his role, he will oversee all product development for ACA’s award-winning ComplianceAlpha® regulatory technology platform and technology enablement at the firm.

ACA Group Acquires Catelas to Create Industry-first 360 Surveillance Offering

The acquisition of Catelas further enhances the holistic surveillance capabilities of ACA’s RegTech platform. Catelas’ patented technology automates the mapping of how people connect and form groups within a firm, isolates collusion risk, and detects high-risk behaviors.

ACA Group and the Investment Adviser Association Announce Strategic Partnership

ACA Group (ACA), a leading provider of governance, risk, and compliance (GRC) advisory services and technology solutions, today announced that it has entered into a strategic partnership with the Investment Adviser Association (IAA), a leading organization dedicated to advancing the interests of investment advisers.

Upcoming events

Common Practices for GIPS® Compliance

ACA has gathered all the common best practices of performance teams complying to the GIPS standards and will discuss the most common question we receive from clients, "What do other firms do?"

Webcast

Compliance Officer: The Roles and Responsibilities - 21 October 2021

The role of the Compliance Officer is a mandatory position in all firms in the Financial Services Industry. They play a major role in assisting Senior Management to ensure that appropriate and effective systems and controls are in place to achieve and maintain compliance with the applicable Rules. While the nature of the Compliance Function is likely to differ from one firm to another, this course provides an easy to follow breakdown of what the Regulator expects of a Compliance Officer and explains, in practical terms how the regulatory expectations and those of Senior Management can be achieved.

Online Training