{"id":37644,"date":"2024-10-21T01:31:52","date_gmt":"2024-10-21T05:31:52","guid":{"rendered":"https:\/\/eptura.wpengine.com\/?p=37644"},"modified":"2025-02-19T10:46:52","modified_gmt":"2025-02-19T15:46:52","slug":"7-big-questions-answered-on-3rd-party-penetration-testing","status":"publish","type":"post","link":"https:\/\/eptura.com\/discover-more\/blog\/7-big-questions-answered-on-3rd-party-penetration-testing\/","title":{"rendered":"7 big questions answered on 3rd party penetration testing"},"content":{"rendered":"<p>If I asked you how secure your company&#8217;s network is right now, how would you respond?<\/p>\n<p><!--more--><\/p>\n<p>Most business owners might say that their systems are quite secure, even when facing strict regulatory compliance. After all, they have all the security controls in place and their IT teams are continuously testing their efficiency.<\/p>\n<p>Let\u2019s look at the facts, then we&#8217;ll explore where 3rd-party penetration testing comes into play.<\/p>\n<h2>How vulnerable to breaches are companies today?<\/h2>\n<p>Ultimately, recent reports and public breaches have shown us that more must be done on a regular basis to further safeguard companies from potential cyber attacks. In fact, according to information security company Trustwave:<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.trustwave.com\/en-us\/resources\/library\/documents\/2019-trustwave-global-security-report\/\" target=\"_blank\" rel=\"nofollow noopener\"><u><img decoding=\"async\" style=\"width: 550px; margin: 60px auto 0px;\" src=\"https:\/\/cdn2.hubspot.net\/hubfs\/437856\/Trustwave%20web%20applications.png\" alt=\"Trustwave web applications\" width=\"550\" \/><\/u><\/a><span style=\"font-size: 13px;\">Source: <a href=\"https:\/\/www.trustwave.com\/en-us\/resources\/library\/documents\/2019-trustwave-global-security-report\/\" target=\"_blank\" rel=\"nofollow noopener\">2019 Trustwave Global Security Report<\/a><\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>That same report indicated that the median number of vulnerabilities detected per application was 15.<\/p>\n<p><strong>So allow me to ask that question again: how secure is your network, really? <\/strong><\/p>\n<p>Many <u>companies worldwide have suffered a data breach<\/u> or cyber attack when they least expected it, causing great financial damages and starting further investigations into their security procedures.<\/p>\n<p>Here\u2019s a bit of good news, though:<\/p>\n<p>The median time between intrusion and detection for externally detected compromises was <u>55 days<\/u> in 2018, down from 83 days in 2017. This is the period of time that allows attackers to obtain sensitive data from a company\u2019s systems and set up mechanisms to collect and extract new data as it\u2019s added.<\/p>\n<p style=\"text-align: center;\"><img decoding=\"async\" style=\"width: 600px; margin: 60px auto 0px;\" src=\"https:\/\/cdn2.hubspot.net\/hubfs\/437856\/Trustwave%20Detection%20Days.png\" alt=\"Trustwave Detection Days\" width=\"600\" \/><span style=\"font-size: 13px;\">Source: <a href=\"https:\/\/www.trustwave.com\/en-us\/resources\/library\/documents\/2019-trustwave-global-security-report\/\" target=\"_blank\" rel=\"nofollow noopener\">2019 Trustwave Global Security Report<\/a><\/span><\/p>\n<p>&nbsp;<\/p>\n<p>Though we might be getting slightly faster at detecting breaches, third-party organizations are still leading the way in detection versus victim organizations themselves.<\/p>\n<blockquote><p>\u201cVictim organizations detected fewer than half of data breaches in 2018, with third-parties, regulatory bodies, or attackers themselves detecting the rest.\u201d &#8211; <u><a href=\"https:\/\/www.trustwave.com\/en-us\/resources\/library\/documents\/2019-trustwave-global-security-report\/\" target=\"_blank\" rel=\"nofollow noopener\">Trustwave Global Security Report, 2019<\/a><\/u><\/p><\/blockquote>\n<h2>Thwart cyber attacks with third-party penetration testing<\/h2>\n<p>So we\u2019re aware that data breaches and compromises are happening at an alarming rate. But how do companies actually get better at combating them?<\/p>\n<p>Apart from having in-house teams to test the security of their systems, organizations should use regular <strong>third-party penetration testing<\/strong> for their cybersecurity risk assessment.<\/p>\n<p><strong>Penetration testing<\/strong>, also called pen testing, is a real-world attack simulation launched on a computer system to uncover vulnerabilities and test the efficacy of a company\u2019s information security program. It&#8217;s also referred to as <strong>ethical hacking<\/strong> as it includes consent between the business and the tester and is performed in a controlled environment.<\/p>\n<h2>1. Why is penetration testing important for securing your organization?<\/h2>\n<p>&nbsp;<\/p>\n<p>First things first, the main objectives of penetration tests are to:<\/p>\n<ul>\n<li><strong>Identify potential breach sites<\/strong> and vulnerabilities through in-depth analysis<\/li>\n<li><strong>Simulate cyber attacks<\/strong> by penetrating vulnerable systems and applications using both manual and automated tools<\/li>\n<li><strong>Gain access to sensitive data<\/strong> and\/or systems<\/li>\n<\/ul>\n<p>As modern IT environments are becoming more and more complex, a company\u2019s IT team can get overwhelmed by potential vulnerabilities that could affect the respective network.<\/p>\n<p><strong>Penetration testing serves as a valuable tool that allows for validation and prioritization of vulnerabilities<\/strong>. This provides IT teams with the opportunity to solve those vulnerabilities that hackers can easily and quickly exploit, particularly that could do the most harm.<\/p>\n<p>&nbsp;<\/p>\n<h2>2. Where does your visitor management system come into play?<\/h2>\n<p>To protect your networks, your business, and your people, performing third-party penetration tests is extremely important from a VMS providers&#8217; standpoint.<\/p>\n<p>At Proxyclick, our team performs these penetration tests using select third-party clients on an ad hoc basis, in addition to our extensive internal scanning and testing program. We also employ third-party security experts annually to perform a broad penetration test across the Proxyclick service offering. (By the way, check out our<\/p>\n<p>&nbsp;<\/p>\n<h2>3. How often should you perform penetration tests?<\/h2>\n<p>Generally, security specialists recommend having a penetration test annually, or whenever a large network change has occurred.<\/p>\n<p>&nbsp;<\/p>\n<h2>4. What are the main types of penetration testing?<\/h2>\n<p>There are two main types of penetration tests: <a href=\"https:\/\/www.javatpoint.com\/black-box-testing-vs-white-box-testing-vs-grey-box-testing\" target=\"_blank\" rel=\"nofollow noopener\">black box and white box tests<\/a>.<\/p>\n<p><img decoding=\"async\" style=\"width: 500px; margin: 60px auto; display: block;\" src=\"https:\/\/cdn2.hubspot.net\/hubfs\/437856\/penetration%20test%20types.png\" alt=\"penetration test types\" width=\"500\" \/><\/p>\n<p>Let&#8217;s break down the differences:<\/p>\n<ol>\n<li><strong>Black box tests:<\/strong> these are performed with little knowledge of the tested network ecosystem &#8211; mostly what is already publicly available on the Internet. A black box test is essentially an objective assessment of a company\u2019s security as seen from an external attacker\u2019s perspective.<\/li>\n<li><strong>White box tests: <\/strong>These are performed while having full knowledge of the tested ecosystem and even internal access to that network. A white box test highlights the great threat posed by insiders who are given physical and logical access to IT resources by a company.<\/li>\n<\/ol>\n<p>Selecting the right approach to penetration testing is essential for obtaining relevant results regarding the company\u2019s security risk.<\/p>\n<p>Keep in mind: a white box test can uncover where a developer accidentally left credentials in the software code, but it will be inadequate in uncovering vulnerabilities in open ports or third-party integrations.<\/p>\n<p>&nbsp;<\/p>\n<h2>5. What are the main benefits of penetration testing?<\/h2>\n<p>There are a number of benefits pen tests can bring to your organization. Here are a few of the main ones:<\/p>\n<ul>\n<li>Avoiding financial damage caused by a security breach<\/li>\n<li>Managing risk more effectively<\/li>\n<li>Having a clearer perspective over your security procedures<\/li>\n<li>Preventing client-side cyber attacks<\/li>\n<li>Assessing response time to security threats<\/li>\n<li>Improving existing security status<\/li>\n<li>Complying with security regulations<\/li>\n<li>Protecting clients\u2019 sensitive data efficiently<\/li>\n<li>Protecting your reputation and your products\/services<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>6. Is penetration testing dangerous for your network?<\/h2>\n<p>The answer to this question comes down to choosing the right provider, as we have done here at Proxyclick. Professional penetration testing teams will have multiple safety measures in place to limit any impacts on your network.<\/p>\n<p><strong>A good service provider will:<\/strong><\/p>\n<ul>\n<li>Ensure that you are both on the same page when it comes to the objective of the test and that there is a realistic scope written down in a formal proposal.<\/li>\n<li>Respect a clear schedule for when tests will be performed so that any interruption of existing services is avoided.<\/li>\n<li>Sign and respect a non-disclosure agreement (NDA) which protects the privacy of the company\u2019s sensitive data.<\/li>\n<li>Have a well-documented testing methodology and they share it with you &#8211; this documentation should follow the standards of the <u>Open Source Security Testing Methodology (OSSTMM)<\/u>.<\/li>\n<li>Report all findings with complete honesty and transparency and offer non-technical and actionable recommendations that can be easily understood by management and staff.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>7. What are some final things to remember about third-party penetration testing?<\/h2>\n<p>Penetration tests can also be <strong>customized to search for vulnerabilities<\/strong> in web applications, mobile devices, wireless networks, and physical security controls.<\/p>\n<p>And while a pen test involves the use of automated tools and process frameworks, <strong>the focus is actually on the team of testers<\/strong>, the experience they bring to the test, and how they leverage their skills and resources when simulating the attacks.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>And while a pen test involves the use of automated tools and process frameworks, the focus is actually on the team of testers, the experience they bring to the test, and how they leverage their skills and resources when simulating the attacks.<\/p>\n","protected":false},"author":26,"featured_media":37908,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":"","_wpscp_schedule_draft_date":"","_wpscp_schedule_republish_date":"","_wpscppro_advance_schedule":false,"_wpscppro_advance_schedule_date":"","_wpscppro_dont_share_socialmedia":null,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"default","_twitter_share_type":"default","_linkedin_share_type":"default","_pinterest_share_type":"default","_linkedin_share_type_page":"","_instagram_share_type":"default","_medium_share_type":"default","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[7,1],"tags":[419,361],"class_list":["post-37644","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-eptura","tag-blog","tag-eptura"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v26.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>7 big questions answered on 3rd party penetration testing | Eptura<\/title>\n<meta name=\"description\" content=\"And while a pen test involves the use of automated tools and process frameworks, the focus is actually on the team of testers, the experience they bring to the test, and how they leverage their skills and resources when simulating the attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eptura.com\/discover-more\/blog\/7-big-questions-answered-on-3rd-party-penetration-testing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"7 big questions answered on 3rd party penetration testing\" \/>\n<meta property=\"og:description\" content=\"And while a pen test involves the use of automated tools and process frameworks, the focus is actually on the team of testers, the experience they bring to the test, and how they leverage their skills and resources when simulating the attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eptura.com\/discover-more\/blog\/7-big-questions-answered-on-3rd-party-penetration-testing\/\" \/>\n<meta property=\"og:site_name\" content=\"Eptura\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EpturaWork\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-21T05:31:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-19T15:46:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eptura.com\/wp-content\/uploads\/2025\/01\/facilities_mgmt_3-1-1024x512-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Jonathan Davis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@epturawork\" \/>\n<meta name=\"twitter:site\" content=\"@epturawork\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jonathan Davis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/eptura.com\/discover-more\/blog\/7-big-questions-answered-on-3rd-party-penetration-testing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/eptura.com\/discover-more\/blog\/7-big-questions-answered-on-3rd-party-penetration-testing\/\"},\"author\":{\"name\":\"Jonathan Davis\",\"@id\":\"https:\/\/eptura.com\/#\/schema\/person\/2e140d3d2f77b87152b5e2ba941b9158\"},\"headline\":\"7 big questions answered on 3rd party penetration testing\",\"datePublished\":\"2024-10-21T05:31:52+00:00\",\"dateModified\":\"2025-02-19T15:46:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/eptura.com\/discover-more\/blog\/7-big-questions-answered-on-3rd-party-penetration-testing\/\"},\"wordCount\":1127,\"publisher\":{\"@id\":\"https:\/\/eptura.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/eptura.com\/discover-more\/blog\/7-big-questions-answered-on-3rd-party-penetration-testing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/eptura.com\/wp-content\/uploads\/2025\/01\/facilities_mgmt_3-1-1024x512-1.webp\",\"keywords\":[\"Blog\",\"eptura\"],\"articleSection\":[\"Blog\",\"Eptura\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/eptura.com\/discover-more\/blog\/7-big-questions-answered-on-3rd-party-penetration-testing\/\",\"url\":\"https:\/\/eptura.com\/discover-more\/blog\/7-big-questions-answered-on-3rd-party-penetration-testing\/\",\"name\":\"7 big questions answered on 3rd party penetration testing | Eptura\",\"isPartOf\":{\"@id\":\"https:\/\/eptura.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/eptura.com\/discover-more\/blog\/7-big-questions-answered-on-3rd-party-penetration-testing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/eptura.com\/discover-more\/blog\/7-big-questions-answered-on-3rd-party-penetration-testing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/eptura.com\/wp-content\/uploads\/2025\/01\/facilities_mgmt_3-1-1024x512-1.webp\",\"datePublished\":\"2024-10-21T05:31:52+00:00\",\"dateModified\":\"2025-02-19T15:46:52+00:00\",\"description\":\"And while a pen test involves the use of automated tools and process frameworks, the focus is actually on the team of testers, the experience they bring to the test, and how they leverage their skills and resources when simulating the attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/eptura.com\/discover-more\/blog\/7-big-questions-answered-on-3rd-party-penetration-testing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/eptura.com\/discover-more\/blog\/7-big-questions-answered-on-3rd-party-penetration-testing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/eptura.com\/discover-more\/blog\/7-big-questions-answered-on-3rd-party-penetration-testing\/#primaryimage\",\"url\":\"https:\/\/eptura.com\/wp-content\/uploads\/2025\/01\/facilities_mgmt_3-1-1024x512-1.webp\",\"contentUrl\":\"https:\/\/eptura.com\/wp-content\/uploads\/2025\/01\/facilities_mgmt_3-1-1024x512-1.webp\",\"width\":1024,\"height\":512},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/eptura.com\/discover-more\/blog\/7-big-questions-answered-on-3rd-party-penetration-testing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/eptura.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"7 big questions answered on 3rd party penetration testing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/eptura.com\/#website\",\"url\":\"https:\/\/eptura.com\/\",\"name\":\"Eptura\",\"description\":\"Work your world\",\"publisher\":{\"@id\":\"https:\/\/eptura.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/eptura.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/eptura.com\/#organization\",\"name\":\"Eptura\",\"url\":\"https:\/\/eptura.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/eptura.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/eptura.com\/wp-content\/uploads\/2024\/03\/eptura-dark-svg-TM-8.png\",\"contentUrl\":\"https:\/\/eptura.com\/wp-content\/uploads\/2024\/03\/eptura-dark-svg-TM-8.png\",\"width\":1280,\"height\":800,\"caption\":\"Eptura\"},\"image\":{\"@id\":\"https:\/\/eptura.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/EpturaWork\/\",\"https:\/\/x.com\/epturawork\",\"https:\/\/www.linkedin.com\/company\/eptura\/\",\"https:\/\/twitter.com\/epturawork\",\"https:\/\/www.youtube.com\/channel\/UC6hdVbsn41BZxfIYmPUdCWQ\"],\"description\":\"A global worktech company that provides software solutions for workplaces, people, and assets that enable everyone to reach their full potential.\",\"legalName\":\"Eptura\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/eptura.com\/#\/schema\/person\/2e140d3d2f77b87152b5e2ba941b9158\",\"name\":\"Jonathan Davis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/eptura.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/eptura.com\/wp-content\/uploads\/2024\/02\/jonathan_davis-96x96.png\",\"contentUrl\":\"https:\/\/eptura.com\/wp-content\/uploads\/2024\/02\/jonathan_davis-96x96.png\",\"caption\":\"Jonathan Davis\"},\"description\":\"As a content creator at Eptura, Jonathan Davis covers asset management, maintenance software, and SaaS solutions, delivering thought leadership with actionable insights across industries such as fleet, manufacturing, healthcare, and hospitality. Jonathan\u2019s writing focuses on topics to help enterprises optimize their operations, including building lifecycle management, digital twins, BIM for facility management, and preventive and predictive maintenance strategies. With a master's degree in journalism and a diverse background that includes writing textbooks, editing video game dialogue, and teaching English as a foreign language, Jonathan brings a versatile perspective to his content creation.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/jonathan-t-davis\/\"],\"jobTitle\":\"Senior Content Writer\",\"worksFor\":\"Eptura\",\"url\":\"https:\/\/eptura.com\/discover-more\/blog\/author\/jonathan-davis\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"7 big questions answered on 3rd party penetration testing | Eptura","description":"And while a pen test involves the use of automated tools and process frameworks, the focus is actually on the team of testers, the experience they bring to the test, and how they leverage their skills and resources when simulating the attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eptura.com\/discover-more\/blog\/7-big-questions-answered-on-3rd-party-penetration-testing\/","og_locale":"en_US","og_type":"article","og_title":"7 big questions answered on 3rd party penetration testing","og_description":"And while a pen test involves the use of automated tools and process frameworks, the focus is actually on the team of testers, the experience they bring to the test, and how they leverage their skills and resources when simulating the attacks.","og_url":"https:\/\/eptura.com\/discover-more\/blog\/7-big-questions-answered-on-3rd-party-penetration-testing\/","og_site_name":"Eptura","article_publisher":"https:\/\/www.facebook.com\/EpturaWork\/","article_published_time":"2024-10-21T05:31:52+00:00","article_modified_time":"2025-02-19T15:46:52+00:00","og_image":[{"width":1024,"height":512,"url":"https:\/\/eptura.com\/wp-content\/uploads\/2025\/01\/facilities_mgmt_3-1-1024x512-1.webp","type":"image\/webp"}],"author":"Jonathan Davis","twitter_card":"summary_large_image","twitter_creator":"@epturawork","twitter_site":"@epturawork","twitter_misc":{"Written by":"Jonathan Davis","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/eptura.com\/discover-more\/blog\/7-big-questions-answered-on-3rd-party-penetration-testing\/#article","isPartOf":{"@id":"https:\/\/eptura.com\/discover-more\/blog\/7-big-questions-answered-on-3rd-party-penetration-testing\/"},"author":{"name":"Jonathan Davis","@id":"https:\/\/eptura.com\/#\/schema\/person\/2e140d3d2f77b87152b5e2ba941b9158"},"headline":"7 big questions answered on 3rd party penetration testing","datePublished":"2024-10-21T05:31:52+00:00","dateModified":"2025-02-19T15:46:52+00:00","mainEntityOfPage":{"@id":"https:\/\/eptura.com\/discover-more\/blog\/7-big-questions-answered-on-3rd-party-penetration-testing\/"},"wordCount":1127,"publisher":{"@id":"https:\/\/eptura.com\/#organization"},"image":{"@id":"https:\/\/eptura.com\/discover-more\/blog\/7-big-questions-answered-on-3rd-party-penetration-testing\/#primaryimage"},"thumbnailUrl":"https:\/\/eptura.com\/wp-content\/uploads\/2025\/01\/facilities_mgmt_3-1-1024x512-1.webp","keywords":["Blog","eptura"],"articleSection":["Blog","Eptura"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/eptura.com\/discover-more\/blog\/7-big-questions-answered-on-3rd-party-penetration-testing\/","url":"https:\/\/eptura.com\/discover-more\/blog\/7-big-questions-answered-on-3rd-party-penetration-testing\/","name":"7 big questions answered on 3rd party penetration testing | Eptura","isPartOf":{"@id":"https:\/\/eptura.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/eptura.com\/discover-more\/blog\/7-big-questions-answered-on-3rd-party-penetration-testing\/#primaryimage"},"image":{"@id":"https:\/\/eptura.com\/discover-more\/blog\/7-big-questions-answered-on-3rd-party-penetration-testing\/#primaryimage"},"thumbnailUrl":"https:\/\/eptura.com\/wp-content\/uploads\/2025\/01\/facilities_mgmt_3-1-1024x512-1.webp","datePublished":"2024-10-21T05:31:52+00:00","dateModified":"2025-02-19T15:46:52+00:00","description":"And while a pen test involves the use of automated tools and process frameworks, the focus is actually on the team of testers, the experience they bring to the test, and how they leverage their skills and resources when simulating the attacks.","breadcrumb":{"@id":"https:\/\/eptura.com\/discover-more\/blog\/7-big-questions-answered-on-3rd-party-penetration-testing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eptura.com\/discover-more\/blog\/7-big-questions-answered-on-3rd-party-penetration-testing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eptura.com\/discover-more\/blog\/7-big-questions-answered-on-3rd-party-penetration-testing\/#primaryimage","url":"https:\/\/eptura.com\/wp-content\/uploads\/2025\/01\/facilities_mgmt_3-1-1024x512-1.webp","contentUrl":"https:\/\/eptura.com\/wp-content\/uploads\/2025\/01\/facilities_mgmt_3-1-1024x512-1.webp","width":1024,"height":512},{"@type":"BreadcrumbList","@id":"https:\/\/eptura.com\/discover-more\/blog\/7-big-questions-answered-on-3rd-party-penetration-testing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/eptura.com\/"},{"@type":"ListItem","position":2,"name":"7 big questions answered on 3rd party penetration testing"}]},{"@type":"WebSite","@id":"https:\/\/eptura.com\/#website","url":"https:\/\/eptura.com\/","name":"Eptura","description":"Work your world","publisher":{"@id":"https:\/\/eptura.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eptura.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/eptura.com\/#organization","name":"Eptura","url":"https:\/\/eptura.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eptura.com\/#\/schema\/logo\/image\/","url":"https:\/\/eptura.com\/wp-content\/uploads\/2024\/03\/eptura-dark-svg-TM-8.png","contentUrl":"https:\/\/eptura.com\/wp-content\/uploads\/2024\/03\/eptura-dark-svg-TM-8.png","width":1280,"height":800,"caption":"Eptura"},"image":{"@id":"https:\/\/eptura.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EpturaWork\/","https:\/\/x.com\/epturawork","https:\/\/www.linkedin.com\/company\/eptura\/","https:\/\/twitter.com\/epturawork","https:\/\/www.youtube.com\/channel\/UC6hdVbsn41BZxfIYmPUdCWQ"],"description":"A global worktech company that provides software solutions for workplaces, people, and assets that enable everyone to reach their full potential.","legalName":"Eptura"},{"@type":"Person","@id":"https:\/\/eptura.com\/#\/schema\/person\/2e140d3d2f77b87152b5e2ba941b9158","name":"Jonathan Davis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eptura.com\/#\/schema\/person\/image\/","url":"https:\/\/eptura.com\/wp-content\/uploads\/2024\/02\/jonathan_davis-96x96.png","contentUrl":"https:\/\/eptura.com\/wp-content\/uploads\/2024\/02\/jonathan_davis-96x96.png","caption":"Jonathan Davis"},"description":"As a content creator at Eptura, Jonathan Davis covers asset management, maintenance software, and SaaS solutions, delivering thought leadership with actionable insights across industries such as fleet, manufacturing, healthcare, and hospitality. Jonathan\u2019s writing focuses on topics to help enterprises optimize their operations, including building lifecycle management, digital twins, BIM for facility management, and preventive and predictive maintenance strategies. With a master's degree in journalism and a diverse background that includes writing textbooks, editing video game dialogue, and teaching English as a foreign language, Jonathan brings a versatile perspective to his content creation.","sameAs":["https:\/\/www.linkedin.com\/in\/jonathan-t-davis\/"],"jobTitle":"Senior Content Writer","worksFor":"Eptura","url":"https:\/\/eptura.com\/discover-more\/blog\/author\/jonathan-davis\/"}]}},"_links":{"self":[{"href":"https:\/\/eptura.com\/wp-json\/wp\/v2\/posts\/37644","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eptura.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eptura.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eptura.com\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/eptura.com\/wp-json\/wp\/v2\/comments?post=37644"}],"version-history":[{"count":0,"href":"https:\/\/eptura.com\/wp-json\/wp\/v2\/posts\/37644\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eptura.com\/wp-json\/wp\/v2\/media\/37908"}],"wp:attachment":[{"href":"https:\/\/eptura.com\/wp-json\/wp\/v2\/media?parent=37644"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eptura.com\/wp-json\/wp\/v2\/categories?post=37644"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eptura.com\/wp-json\/wp\/v2\/tags?post=37644"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}