Our Company

 

DATAFARM is experienced and certified IT Security company.

+ Our Security Services help you identify vulnerability, predict attacks and evaluate risk to protect your data from cyber Attack.

Penetration Testing

Penetration testing is an official procedure aimed at finding security vulnerabilities, flaws risks, and unreliable environment. Think Like a Hacker & Protect DATA Before It’s Too Late

Vulnerability Assessment

Vulnerability assessment is the process identifying vulnerabilities in computer systems and network infrastructures.

Security Consulting

Our Consulting Services accelerate your digital transformation journey to implement, design and choose the most effective and suitable security solutions

Why need Penetration Testing?

 

Which Industries need Penetration testing?

Due to the highly regulatory nature of some industries – such as service providers, healthcare, and banking – penetration testing is essential to ensuring compliance. Below are some of the common regulations that require penetration testing for compliance: - Companies who need to secure their data. - Companies who need to comply with criteria and procedures of regulator or government. - Companies who need to comply the compliance such as ISO27001, PCI-DSS, HIPAA etc.

What does Cybercrime mean?

Cybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes). Cybercriminals may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes. Criminals can also use computers for communication and document or data storage. Criminals who perform these illegal activities are often referred to as hackers.

How to Protect Your Business from Cyber Attacks?

Cyber security protects the data and integrity of computing assets belonging to or connecting to an organization’s network. The purpose of “Penetration testing” is to identify any weak spots in a system’s defenses which attackers could take advantage of. Cyber-security expert attempts to find and exploit vulnerabilities in a computer system by simulated attack based on standard and methodologies from global community (for example, OWASP TOP 10, SANS Top 25, CERT Secure Coding, etc.)

Our Team

 

We are specialist in information security. Our main services include vulnerability assessment (VA) and penetration testing (Pentest). These services help increase the overall capability of IT system from attacking, thus cause the business works without interruptions. We have experienced and certified team members to identify weak areas, simulate attack, evaluate the risk, then, and give the recommendation to our client to protect their IT system.

 

Our Certificates

  • CISSP
  • CSSLP
  • CISA
  • CISM
  • CGEIT
  • CRISC
  • GPEN
  • GXPN
  • OSCE
  • OSCP
  • SECURITY+
  • CEH

Vulnerability Assessment

  • What is Vulnerability Assessment?

Vulnerability Assessment is scanner by tools that focus on cause of technical such as vulnerability of software, unnecessary service. Which may lead to attack on system. Vulnerability assessment on target but not really attack on system and then conclude result on report and how to resolve vulnerability appropriately.

  • Target of VA
    • Web Server, Web Service,Web Application Scanner scan Web vulnerability by acunetix web vulnerability scanner.
    • Infrastructure, Network,System Scanner scan system vulnerability by tenable nessus.
    • Professional VA Service Scanner scan target by multi tools and evaluation vulnerability by professional.

Penetration Testing

  • What is Penetration Testing?

Penetration testing (or pen testing) is a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system. The purpose of this simulated attack is to identify any weak spots in a system’s defenses which attackers could take advantage of. Case of Penetration Testing

  • Target of Penetration Testing
    • Web Server, Web Service, Web Application Testing on Web service, Webserver, Web application to achieve the objective follow agreement.
    • Infrastructure, Network, System Testing on Infrastructure, Network, System to achieve the objective follow agreement.
    • Mobile App Testing on IOS and Android to achieve the objective follow agreement.
    • Wi-Fi Testing on Wi-Fi since physical until access to Wi-Fi system that tester haven’t permission.
    • Physical Testing on physical layer such as key system, electronic door, and electronic card. To test whether the tester can access the important document or system.

Consulting Service

  • With many years of experience in security consultation,design,and implementation, DATAFARM’s consultants enable customers to apply the right security products and solutions to best fit their requirements and maximize protection to their business.
    • Network Security Improvement
    • Security Log Analysis
    • Security Policy Tuning
    • Security Solution for SME and Public Company

Authorized Reseller

 

Vulnerability Scanner Tools

DATAFARM is an authorized partner of Acunetix to consult and implement for Acunetix web vulnerability scanner software in Thailand.

Acunetix
  • Acunetix web vulnerability scanner is a tool designed to discover security holes in your web applications that an attacker would likely abuse to gain illicit access to your systems and data. It looks for multiple vulnerabilities including SQL injection, cross site scripting, and weak passwords.
Tenable Nessus
  • Nessus is a remote security scanning tool, which scans a computer or server and raises an alert if it discovers any vulnerabilities that malicious hackers could use to gain access to any computer. It uses the Common Vulnerabilities and Exposures architecture for easy cross-linking between compliant security tools.
Rapid7 AppSpider
  • AppSpider is a dynamic application security testing solution that allows you to scan web and mobile applications for vulnerabilities. AppSpider enables you to effectively manage your application security program, delivers thorough analysis, comprehensive application coverage and sophisticated attack methodologies.
PortSwigger
  • Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process,from initial mapping and analysis of an application’s attack surface, through to finding and exploiting security vulnerabilities.

Our Activities

Our Blog

 

See our blog content on facebook

Contact Us

 

Datafarm Company Limited

Central Area : CP Tower 2, Level 21, 1 Radchadapisek Road, Dindaeng, Dindaeng Bangkok 10400

 

North Area : 260 M.5 Pahonyothin Road Maechan, Maechan Chiangrai 57110

 

LINE ID : @DATAFARM

Tel : +66 8 9178 1287 , +66 2 009 3434