With all the security risks to contend with these days, it's crucial for IT decision makers to determine how to prioritize risks in order of importance, so they can be handled appropriately. There's no better way to determine priority than to use a pen test to identify areas of weakness.
Multiple Attack Vectors
One of the great benefits of an in-depth pen test is that multiple attack vectors can be used together to identify complex vulnerabilities which often go unidentified. Many security tools to prevent against a certain subset of attack vectors. Two or more security tools are then pieced together to create a defense-in-depth strategy thought to protect against a multi-vector threats. The only way to really determine whether disparate security tools can truly work together is to validate using the same multi-vector attack strategies the bad guys might use.
Even the most well managed and robust network infrastructures contain backdoors -- often through misconfigurations. Sometimes the best way to figure out where these security holes are located is to let a third party run a penetration test. Putting fresh eyes on any network often unveils security faults that had previously gone unnoticed