54BD 783A 27D2 85C1 C46D 5A02 3651 ADE3 E402 9FC2

Services > Vulnerability Assessments

Each vulnerability assessment encapsulates a process to identify, classify, report on and provide remediation advice for the security weaknesses of a constituent’s IT infrastructure. It entails a scan to uncover exploitable weaknesses in network devices, servers and systems. The results are manually verified and then compiled into an easy-to-read, actionable report.

A combination of regularly scheduled vulnerability assessments and penetration testing will help institutions identify security weaknesses in IT infrastructure before they can be used in an attack. The institution can then take action to remedy the weaknesses and prevent an attack/compromise.

Key features:

  • External and internal options available
  • Multiple scanners used (commercial and open source)
  • Scalable to unlimited IP addresses
  • Optional DNS verification
  • Customised report and remediation advice
  • Severity-level classification to aid remediation prioritisation
  • Manual (infosec expert) verification
  • User-friendly, actionable report (reduced page count)
  • Follow up advice or assistance (limited)
  • Cost-effective charging model

What we need:

  1. Permission to scan – from the appropriate authority
  2. List of domain(s) and/or IP addresses
  3. Security contact details + PGP key

You get:

  1. Extensive, low-intensity assessment using multiple scanners
  2. Manual verification/analysis/research
  3. Report summarising the findings and providing actionable remediation advice
  4. Limited follow-up consultation if required

From passionate information security specialists!

Contact us now!