Call a Specialist Today! 800-886-5787 Free Shipping! Free Shipping!


Clone Guard by Clone Systems

Clone Systems - Business Security Intelligence
Properly Secure Your Enterprise Network

Clone Guard Real-Time Network Security

Free Clone Guard Network Audit

Clone Systems is a global network security provider established in 1998. Since our company’s inception, we have distinguished ourselves by delivering innovative security solutions and services, around-the-clock customer support, and service guarantees, which are among the most comprehensive in our industry.

Managed Penetration Testing:

Perform real world attack simulations on your infrastructure to identify existing vulnerabilities and obtain recommendations on how to improve your overall security

Obtain support, education, and guidance from certified security engineers on how to improve your network

  • Managed by our certified security engineers who have extensive experience with assessing vulnerabilities for both security and compliance
  • Detailed vulnerability report including high, medium, and low vulnerabilities found and exploited with remediation guidance and recommendations

Improve your overall security posture and your policies and procedures by understanding the vulnerabilities within your network and how to remediate them

  • Identify and exploit vulnerabilities by simulating real-world attacks to assess the security posture of your network
  • Robust solution using the latest technology comprised of a combination of best of breed open source, and proprietary tools
  • 4 days of comprehensive testing with a combination of white hat and black hat techniques with and without passwords to assess your network
  • Perform internal and external penetration testing customized to meet your business requirements
  • Social engineering options available that imitate techniques used by hackers to target your employees to obtain your company’s private information
  • Ample time included for remediation followed by a rescan of your environment to assess the status of vulnerabilities

Meet and exceed audit, regulatory and compliance requirements validated by Clone Systems security expertise

  • Certified pass report after assessing that there are no high or medium vulnerabilities in your environment
  • Includes 1 year access to our OnDemand web-based scanning portal to allow your team to perform ongoing assessments of your security posture

How Managed Penetration Testing Works

Our team of certified security engineers will work closely with you to understand your business requirements, identify the infrastructure and applications that will be in scope for the penetration test, and to schedule the 4 days of comprehensive testing. They will then simulate real-world attacks against the in-scope assets using best of breed open source and proprietary tools with the latest threat intelligence. A combination of white hat and black hat techniques will be leveraged to validate your internal and external security controls and to discover any weaknesses that can be used to compromise and gain unauthorized access to your environment. Any identified risks and vulnerabilities will be documented and our security engineers will review the findings with your team and provide guidance on how to remediate the vulnerabilities and improve your security posture. Ample time will be provided to your team to address and resolve the findings after which we will conduct another rescan of your environment. Upon confirming that the identified security risks and vulnerabilities have been addressed we will provide a certified pass report that can be used to meet your audit, regulatory and compliance requirements.

Ondemand Penetration Testing

Perform real world attack simulations on your infrastructure to identify existing vulnerabilities and obtain recommendations on how to improve your overall security

Proactively assess your network for vulnerabilities and identify corrective actions

  • OnDemand web-based portal to conduct self-managed penetration testing
  • 7-day access for unlimited scanning of up to 255 IPs on your network to assess vulnerabilities for security and compliance*
  • Perform internal and external penetration testing customized to meet your business requirements

Improve your overall security posture and your policies and procedures by understanding the vulnerabilities within your network and how to remediate them

  • Identify and exploit vulnerabilities by simulating real-world attacks to assess the security posture of your network
  • Detailed vulnerability report including high, medium, and low vulnerabilities found and exploited with remediation guidance

Meets compliance requirements validated by Clone Systems security expertise

  • Certified pass report after assessing that there are no high or medium vulnerabilities in your environment

How Ondemand Penetration Testing Works

Your team can proactively test your internal and external security controls and assess your infrastructure for vulnerabilities and weaknesses that can be used to compromise and gain unauthorized access to your environment by conducting a self-managed penetration test using a comprehensive security scanning solution with the latest threat intelligence. A series of real world attack simulations will be performed against the assets that you configure within the solution and any identified risks or vulnerabilities will be highlighted in a detailed vulnerability report with remediation guidance. Your team can then work to resolve the findings and then rescan your infrastructure to confirm that any identified security risks and vulnerabilities have been addressed. Once the assets are secured from all known high and medium vulnerabilities a certified pass report can be accessed and used to meet your audit, regulatory and compliance requirements.

Our battery of security management benchmarks are rigorous and uncompromising. Some of the high level analysis and performance evaluation stages that are conducted by the OnDemand Penetration testing include the following:

  • Reconnaissance encompasses passive and active reconnaissance tactics to identify and evaluate your network topology, active hosts, IP addresses, installed operating systems, open network ports, and all installed security devices.
  • Analysis entails performing application mapping, network scanning/fuzzing, and vulnerability analysis. It effectively identifies all applications running behind open network ports and their degree of potential vulnerability The Analysis stage typically involves running SQL Injection, Code Injection, Code Execution, Directory Traversal, and Cross Site Scripting against the web applications to expose any security anomalies.
  • Penetration employs the data derived from the Analysis stage to exploit the determined weak points of your network to attempt to gain access. Typically, the Penetration phase focuses primarily on vulnerabilities revealed for network services and externally facing web applications.
  • Information. This phase generates alerts once a vulnerability has been successfully exploited. A system restore is immediately performed to return the network to its previous state prior to the intrusion. A detailed report is generated on all areas of your enterprise for assessing how and why the intrusion was successful.
  • Finally, the Documentation phase reflects all testing results, all intrusions, the areas of the system that were compromised during an intrusion, intrusion-resistance recommendations, and qualitative analysis reports of each security mechanism employed on your network.

OnDemand Penetration Testing Overview

Payment Card Industry (Pci) Compliance Scanning

Comply with the Payment Card Industry Data Security Standard (PCI DSS) and safeguard your customer’s data

Leverage a robust PCI data security scanning solution from an Approved Scanning Vendor (ASV) that meets all the PCI Security Standards Council requirements

  • Easy to use self-managed web-based scanning portal which enables you to maintain PCI compliance by scheduling and running scans every 90 days or as often as you want
  • Analyze your solutions that store, process, or transmit cardholder data for threats and vulnerabilities that could expose sensitive data

Minimize the risk of compromise for cardholder data and the potential impact on your organization

  • Detailed remediation steps for protecting against identified vulnerabilities detected during your PCI security scan
  • Unlimited re-scans on your network to assess steps taken to fix vulnerabilities
  • Threat intelligence and signature updates consistently updated from multiple security sources to protect against emerging threats and vulnerabilities

Fulfill PCI compliance reporting requirements for the acquiring banks, card brands or other requesting entities you do business with

  • Executive, Detailed and Attestation PCI reports with ASV certification number to address your assessment and compliance reporting requirements
  • Online Self-Assessment Questionnaire (SAQ) for all the different SAQ types to assist you with reporting the results of your PCI DSS self-assessment

How PCI Compliance Scanning Works

Payment Card Industry (PCI) compliance scans are conducted through a self-managed web-based PCI Compliance Scanning portal which is consistently updated with the latest threat intelligence and certified annually to meet all the PCI Security Standards Council requirements. Using a simple interface or intuitive wizard you configure, schedule and run scans for the hosts that store, process or transmit cardholder data. If vulnerabilities are identified you are presented with details about the vulnerabilities and remediation steps that can be used to address them. Your team can then work to resolve the findings and then rescan the hosts to confirm that any identified vulnerabilities have been addressed. Once your hosts that process credit card information are secured from all known high and medium vulnerabilities the Executive, Detailed and Attestation PCI compliance reports will be certified with a passing status and can be delivered to your acquiring banks, card brands or other requesting entities you do business with. Additionally, the portal provides a Self-Assessment Questionnaire (SAQ) wizard that can be used to help you identify the SAQ type that aligns with your business requirements so you can complete an online version of the SAQ and report the results of your PCI Data Security Standards (DSS) self-assessment.

PCI Compliance Scanning Overview

Vulnerability Assessment

Assess the security and integrity of your infrastructure to identify vulnerabilities and obtain recommendations on how to improve your overall security posture

Vulnerability Assessment

Proactively assess your network to identify and prioritize your network security threats

  • Easy to use self-managed web-based scanning portal which enables you to schedule and run scans as needed
  • Perform internal and/or external vulnerability testing to obtain a deeper understanding of your overall security posture

Minimize the risk of a security breach by providing insights and guidance to properly secure your network

  • Detailed remediation steps for protecting against identified vulnerabilities detected during your vulnerability assessment
  • Unlimited re-scans on your network to assess steps taken to fix vulnerabilities
  • Threat intelligence and signature updates consistently updated from multiple security sources to protect against emerging threats and vulnerabilities

Obtain executive level and detailed technical reporting for the vulnerabilities that exist in your infrastructure

  • Pass report after assessing there are no existing high or medium level vulnerabilities in your environment

How Vulnerability Assessment Works

External Vulnerability Scanning

External vulnerability scans are scheduled through the Clone Systems Vulnerability Assessment portal. When the scans are executed our scanning infrastructure assesses the hosts identified in the scan criteria against our threat intelligence and signatures in order to identify any existing threats, vulnerabilities or weaknesses. The results are then recorded in our solution and available via the Clone Systems Vulnerability Assessment portal so that you can review remediation steps and take any necessary actions. Upon remediating you can rescan the hosts to determine the status of your security posture.

External Vulnerability Scanning

Internal Vulnerability Scanning

Internal vulnerability scans require you to configure a Clone Systems scanning server within your network. The scanning server can either be a physical server or a virtual server and we support the majority of virtual environments (VMware, VirtualBox, Microsoft Hyper-V, and Citrix XEN to name a few). Upon configuring the internal scanning server and confirming secure connectivity back to the Clone Systems SOC you can schedule the vulnerability scan through the Clone Systems Vulnerability Assessment portal. When the scans are executed our solution communicates directly with the scanning server within your network to assesses the hosts identified in the scan criteria against our threat intelligence and signatures in order to identify any existing threats, vulnerabilities or weaknesses. The results are then recorded in our solution and available via the Clone Systems Vulnerability Assessment portal so that you can review remediation steps and take any necessary actions. Upon remediating you can rescan the hosts to determine the status of your security posture.

Internal Vulnerability Scanning

Get Clone Guard Pricing and Product Information at:

Clone Guard Managed Network Security