GDT Webinar Series – How to Fail at Security? Reserve Your Spot

Is there value or risks in using an offshore security testing service to conduct penetration testing?

offshore security testing services

By Dr. Stephen Inocencio, PhD, DSI
GDT Vice President, Security Advisory Services

In IT, penetration testing is when a 3rd party is conscripted to simulate a cyberattack against your organization. It determines where you are from a security standpoint, and where you need to be. Where are your vulnerabilities and how will they be addressed? It’s looking at your attack surface and ensuring that existing vulnerabilities are being comprehensively addressed.

You may think that it doesn’t matter who starts an “automated scan” and spits out a report, but while suppressing the rage induced by someone calling a full penetration test a scan, I can say that there are definitely some things to think about prior to outsourcing your penetration testing requirements to an offshore company, or one (1) that uses offshore resources/contractors.

What’s the Big Deal About Using an Offshore Penetration Company?

I’m sure there are some great penetration testing companies that use offshore resources, and I know there are great penetration testing companies headquartered outside the United States. The following isn’t intended to be derogatory in any way. The things that apply when deciding about hiring a penetration testing company applies here, too, regardless of where they’re headquartered. The main difference is that some of these problems may be exacerbated due to issues like, for instance, language barriers or an inability to verify background checks, certifications, etc.

The reason all this may seem so complicated and nerve-racking is due to the fact that, in the grand scheme of things, the industry is still pretty young. There are no official distinctions or certifications needed to become a penetration testing company or offer consulting or penetration testing services. So, an offshore penetration testing company may be more difficult to vet and is often based on exactly how much information they are willing to provide.

Here are some things you should consider when determining who to use for your organization’s penetration testing:

Communication issues

I’m not talking about just a language barrier, although that can make a lot of things more difficult. Reporting may be in a different format, or, due to cultural differences, it may be explained differently than what you are expecting. Or, the reports provided may not be presented to you by the people who actually did the testing due to time zone differences. Also,  time zone differences can extend the length of the testing and delay documentation required to complete a project due to troubleshooting issues or transferring scoping information. These communications issues may not concern you as much and may even merit the lower price point, but should definitely be considered.

Difficulty vetting resources

Things like background checks, criminal records, and certification validation are all more difficult with offshore resources. You should always consider who, exactly, is doing your penetration testing. For example, what is the experience level of the test team, what certifications do they hold, and what is their level of education? Unfortunately, penetration test results are only as good as the tester who worked on the project. And while GDT always provides biographies for the engineers working on our assessment projects, many companies don’t. While there are plenty of offshore resources that are terrific penetration testers, it may be difficult to know if you’re getting an expert or a novice.

The quality of the test you’re getting

In addition to the difficulties regarding who is conducting the test, it’s also difficult to discern whether whomever did your penetration test actually did a good job. Most people engaging a third-party company to perform penetration testing are not experts themselves (although some are and just need third-party validation), so, if you receive a clean report, is that a good or bad thing? Are you really secure, or were vulnerabilities missed? So, while you may have opted for a less expensive option, there may be a ton of issues missed; it can be very hard to tell.

Giving network access to an offshore company

This is usually enough to keep most CISOs and engineers up at night. Companies do their best to protect their external and internal networks and end points, so handing out internal information and not knowing exactly who will get it, and if it will be retained or shared, is a chilling thought.

So, considering the aforementioned issues you need to consider, what should you do? Is it OK to use an offshore penetration testing company, or not? It’s important to note that GDT, due to our high standards for quality and core values that include quick and effective communications with our clients, does not utilize offshore resources for our penetration testing. But, that doesn’t mean companies that do are bad or ineffective (and, yes, they’re often cheaper). It just means that you’ve got to put a lot more time and conduct more due diligence prior to hiring them. You have to ensure you’re going to receive a thorough test, utilize a capable engineering team, and receive a high-quality product.

If you have questions about security penetration testing, contact these pro’s

To find out how to shore up your organization’s security posture, contact GDT’s tenured and talented engineers and security analysts at From their Security and Network Operations Centers, they manage, monitor and protect the networks of organizations of all sizes, including those for some of the most notable enterprises, service providers, healthcare organizations and government agencies in the world. They’d love to hear from you.

If you want more information about network security, read about it here:

If “123456” looks way, way too familiar, you may be heading for trouble

Oh, no, not the CAPTCHA screen

If you’re storing data down under, you’re likely re-thinking that decision, says Microsoft president

What’s left when a supply-chain reliant corporation gets hacked? Paperwork

Introducing your cyber threat starting lineup

Death and Taxes—and you can add this to the mix

If you doubled down on Russia, your bet’s safe

What happens in an ATM, doesn’t always stay in an ATM

Google launches itself into cybersecurity space

Getting Stuffed at Dunkin’ Donuts?

Security Myths Debunked

State of the Union address focuses on technology–briefly

The technology arms race was just amped up

Apparently, cyber attackers also consider imitation to be the sincerest form of flattery

Last week’s DHS “alert” upgraded to “an emergency directive”

The Collection #1 data breach—sit down first; the numbers are pretty scary

Shutdown affects more than workers

DDoS Attacks will deny a Massachusetts Man Ten (10) years of Freedom

Phishing for Apples

This isn’t fake news

Don’t get blinded by binge-watching

Mo Money, Mo Technology―Taylor Swift uses facial recognition at concerts

Step aside all ye crimes—there’s a new king in town

Q & A for a Q & A website: Quora, what happened?

They were discovered on Google Play, but this is no game

And in this corner…

Elections are in, but there’s one (1) tally that remains to be counted

Hiring A Hacker Probably Shouldn’t Be Part of Your Business Plan

Gen V

Sexy, yes, but potentially dangerous

Tetration—you should know its meaning

It’s in their DNA

When SOC plays second fiddle to NOC, you could be in for an expensive tune

How to protect against Ransomware


Share this article

You might also like:

AI and Data Security

The advent of artificial intelligence (AI) brings transformative potential across industries while also introducing significant data security challenges. As AI systems become integral to operational and decision-making processes, safeguarding sensitive information against sophisticated threats is paramount. This exploration sheds light on the complexities of AI and data security and proposes

Transport layer security (TLS)

Transport layer security (TLS) is one of the most common tools for keeping users safe on the internet. When automated, TLS certification management can help organizations ensure more reliable and consistent use of TLS, reducing the need for human intervention and risk of human error. In fact, over the years,


As the head of GDT’s security practice and an industry veteran, Jeanne Malone and her team help customers worldwide advance their cybersecurity posture. One of the biggest cybersecurity game-changers is artificial intelligence (AI). We asked Jeanne to weigh in on leveraging AI and machine learning in cybersecurity to improve intrusion