Skip to content

Frequently Asking Questions

What is PentestBX?

PentestBX is a comprehensive cybersecurity platform that helps organizations manage their cyber risks proactively. It provides a suite of tools for vulnerability scanning, penetration testing, and risk management.

How can PentestBX help me improve my cybersecurity posture?

PentestBX can help you improve your cybersecurity posture in a number of ways:

  • Identify and remediate vulnerabilities: PentestBX can scan your network and systems for vulnerabilities that could be exploited by attackers. Once vulnerabilities are identified, you can prioritize and remediate them to reduce your risk of attack.
  • Automate security tasks: PentestBX can automate many of the time-consuming tasks associated with cybersecurity, such as vulnerability scanning and reporting. This can free up your security team to focus on more strategic initiatives.
  • Improve compliance: PentestBX can help you comply with a variety of security standards and regulations, such as PCI DSS and HIPAA.
  • Raise employee awareness: PentestBX can help you raise employee awareness of cybersecurity risks through best practices. This can help to reduce the risk of human error, which is a leading cause of data breaches.
What are the benefits of using PentestBX?

There are many benefits to using PentestBX, including:

  • Improved security posture: PentestBX can help you improve your overall security posture by identifying and remediating vulnerabilities, automating security tasks, and improving compliance.
  • Reduced risk of attack: By identifying and remediating vulnerabilities, PentestBX can help you reduce your risk of being attacked by cybercriminals.
  • Lower costs: PentestBX can help you lower your cybersecurity costs by automating security tasks and improving compliance.
  • Increased productivity: PentestBX can help increase the productivity of your security team by automating security tasks and freeing them up to focus on more strategic initiatives.
How does PentestBX work?

PentestBX works by using a combination of vulnerability scanning, penetration testing, and risk management tools.

  • Vulnerability scanning: PentestBX can scan your network and systems for known vulnerabilities. This can be done on a regular basis to identify new vulnerabilities as they are discovered.
  • Penetration testing: PentestBX can simulate a cyberattack to identify any weaknesses in your security defenses. This can help you to find and fix vulnerabilities that may not be detected by vulnerability scanning.
  • Risk management: PentestBX can assist you in assessing your cyber risks and prioritizing remediation efforts, helping you optimize your security resources.
Is PentestBX easy to use?

Yes, PentestBX is easy to use. It has a user-friendly interface that makes it easy to find and use the tools you need. PentestBX also comes with a library of pre-built scans and reports that can help you get started quickly.

What is the difference between PentestBX and other cybersecurity solutions?

PentestBX is a comprehensive cybersecurity platform that provides a suite of tools for vulnerability scanning, penetration testing, and risk management. Other cybersecurity solutions may only focus on one or two of these areas.

  • What are the different versions of PentestBX?

PentestBX is available in three versions: Community, Professional, and Enterprise. The Community version is free and  ideal for small businesses and home users. The Professional version is paid and suitable for medium-sized businesses. The Enterprise version is also paid and designed for large enterprises.

  • What is PentestBX’s pricing?

PentestBX’s pricing is based on the version of the platform that you choose. You can find more information about our pricing on our website at https://pentestbx.com/.

  • How can I get support for PentestBX?

We offer a variety of support options for PentestBX, including online documentation, email support, and phone support. You can find more information about our support options on our website at https://pentestbx.com/.

How can I get PentestBX support?

We offer a variety of PentestBX support options, including online documentation, email support, and phone support. Visit our website at https://pentestbx.com/ for more information on our support options.

How does PentestBX ensure the reliability of scan results?

PentestBX uses vulnerability rules aligned with CVE and OWASP standards. All scans follow the same repeatable methodology, and scan logs are digitally signed with SHA-256. Data is encrypted with AES-2048 both in the cloud and on the appliance.

How is the accuracy of reports guaranteed?

Reports are normalized to make results comparable across different scans. This ensures consistency over time and guarantees both the validity and reliability of the reports.

Are independent security tests performed on PentestBX?

Yes. At least once a year, independent cybersecurity firms perform penetration tests at both the network and application levels, simulating real-world attacker behavior.

Who can access penetration test results?

Full reports, which contain sensitive details, are accessible only to our authorized security team. Customers receive summary reports showing that critical findings have been resolved.

What deployment options are available for PentestBX?

There are two deployment methods:

  • Cloud Deployment: Each customer’s data is stored in a dedicated, isolated database. Data transmission is secured with TLS 1.3, and data at rest is encrypted with AES-2048. Role-Based Access Control (RBAC) is enforced, and all activities are logged.

  • On-Premise Appliance: A virtual appliance runs within the customer’s own network. It connects to the cloud only via VPN with no direct internet access. Data is stored encrypted and isolated on the appliance, with strict access control and audit logging.

Where are PentestBX servers located?

Our cloud servers are hosted in high-security ISO 27001 and SOC 2 certified data centers located in Turkey and Europe.

What commitments does PentestBX provide regarding customer data?
  • Data is always isolated, redundant, and encrypted.

  • Appliance access is restricted to VPN connections, preventing unauthorized access.

  • Network and host-level segmentation is enforced.

  • Logs and scan results are stored with guaranteed integrity and accuracy.

What is the main assurance for customers?

PentestBX ensures vulnerability scanning and data management fully aligned with industry standards. Security is maintained through encryption, RBAC, audit logging, and network isolation, as well as continuous security testing by independent firms. Customers can choose between cloud or on-premise deployment for maximum flexibility and control.