Penetration testing, also referred to as pen testing, is a simulated real-world attack on a network, application, or system that identifies vulnerabilities and weaknesses. Penetration tests (pen tests) are part of an industry recognized approach to identifying and quantifying risk. They actively attempt to ‘exploit’ vulnerabilities and exposures in a company’s infrastructure, applications, people and processes. Through exploitation, JAS Business Systems is able to provide context around the vulnerability, impact, threat and the likelihood of a breach in an information asset. JAS Business Systems can provide strategic guidance on risk and tailored advice on counter measures.