Frequently Asked Questions

Get the answers you need to choose the right security services for your organization.
    What is an Attestation Letter?
    Deliverables  |  FAQ
    Updated: October 15th, 2024 What is an Attestation Letter? Simply put, an attestation letter (often ...
    Continue Reading
    Should We Switch Vendors Annually?
    Secure Ideas works with lots of different organizations in almost all verticals. One of the ...
    Continue Reading
    What are the Best Penetration Testing Companies?
    Over the last decade of security testing, we have often been asked which other penetration testing ...
    Continue Reading
    How Do Prepurchased Credits Work?
    FAQ
    Test Credits are essentially a currency used to streamline the process when your organization is ...
    Continue Reading
    How Do We Estimate Testing Credits?
    FAQ
    Estimating Prepaid Credits At some point you may be attempting to work out just how many Credits ...
    Continue Reading
    What's the difference between API and Web Application Pentests?
    Comparisons  |  FAQ
    Web applications are now remarkably complex. Whether its Internet of Things (IOT) devices, mobile ...
    Continue Reading
    How Do We Embed Testing in Our SDLC?
    Shift Left! Fix earlier! These are the calls that we hear more and more from the industry. And as ...
    Continue Reading
    Do you offer discounts on security services and classes?
    FAQ
    We believe the first step in creating a secure state of mind is learning and sharing knowledge. But ...
    Continue Reading
    How should I communicate a security incident?
    FAQ
    If you are in the unfortunate situation of having to disclose an information security breach to the ...
    Continue Reading
    Can We See a Sample Report from a Penetration Test?
    If you are thinking about engaging a security consulting company, at some point you will probably ...
    Continue Reading
    Why doesn't Secure Ideas offer Remediation?
    FAQ
    Remediation is the process of taking the necessary steps to address and secure areas of weakness ...
    Continue Reading
    Has contents: true Total pages: 7 Current page: 6