Contact Information
Have questions? Would you like to talk about your upcoming initiatives? Need a quote for services? Reach out and get in touch.
Frequently Asked Questions
Rotas is focused on practically assessing organizations’ security posture by leveraging adversarial techniques. In the realms of services, Rotas’ primary focus is performing penetration testing and risk and vulnerability assessments. Rotas specializes in leveraging a hacker’s perspective in all that we do. Rotas also has a strong R&D focus, hunting for exploits and performing bespoke research projects. Lastly, Rotas partners with organizations to help with their cybersecurity initiatives; everything from attack surface and vulnerability management and technology security evaluations, to security program guidance.
We’d be happy to tell you. But first, what do you want done? We need to have more information about the nature of your initiative or project to be able to provide you even a rough order of magnitude quote. Just like a building a deck, you’d need to figure out the length, height, cost of materials, etc. The most common aspects that go into project based penetration testing is the number of live assets that would undergo assessment. For example the number IP addresses or hostnames, or the number of applications, or the number of scenarios or employees that will undergo phishing exercises. The number of assets that will be assessed helps Rotas to understand the level of effort required. Fill out the contact form above and we’ll get back to you and can get you a quote after gathering a bit more information about your project.
Do you have any computer systems connected to a network? Do you want to know what an attacker could do if they targeted you, or found a path to an initial foothold in your environment? Would you like to know if the security systems you have implemented help you detect and prevent malicious activity? If you answered yes to any of these questions, a pentest would serve you well.
The Rotas penetration testing and security assessment methodology was developed by leveraging industry standards such as the Penetration Testing Execution Standard (PTES) and the Open Source Security Testing Methodology Manual (OSSTMM). Rotas also utilized the PCI DSS penetration testing guidance, and NIST SP 800-115 (Technical Guide to Information Security Testing and Assessment). Rotas combined these guides with experiential and practical exercises to come up with a phased testing methodology. Briefly, those phases are discovery, enumeration, mapping, and exploitation. For more in-dpeth information on the Rotas methodology, leverage the contact form above and we’d love to connect and discuss.
The name was derived from the Sator (or Rotas) square, an ancient palindrome cryptogram. Many scholars are still trying to figure out the origin and purpose of the Rotas Stone (as it is sometimes called). Our founder has always been fascinated with history, and a palindrome that also appears to be a cryptogram resonated on many different levels.