1395 5E65 0C7A 5CEF 0373 F6E2 8982 15F5 6081 EBEB
Each vulnerability assessment encapsulates a process to identify, classify, report on and provide remediation advice for the security weaknesses of a constituent’s IT infrastructure. It entails a scan to uncover exploitable weaknesses in network devices, servers and systems. The results are manually verified and then compiled into an easy-to-read, actionable report.
Regularly scheduled vulnerability assessments will help institutions identify security weaknesses in IT infrastructure before they can be used in an attack. The institution can then take action to remedy the weaknesses and prevent an attack/compromise.
External and internal options available
Multiple scanners used (commercial and open source)
Scalable to unlimited IP addresses
Optional DNS verification
Customised report and remediation advice
Severity-level classification to aid remediation prioritisation
Manual (infosec expert) verification
User-friendly, actionable report (reduced page count)
Follow up advice or assistance (limited)
Cost-effective charging model
1. Permission to scan – from the appropriate authority
2. List of domain(s) and/or IP addresses
3. Security contact details
1. Extensive, low-intensity assessment using multiple scanners
2. Manual verification/analysis/research
3. Report summarising the findings and providing actionable remediation advice
4. Limited follow-up consultation if required
From passionate information security specialists!
Contact Us: |
CSIRT: |
|
Heloise: |
|
Kgwadi: |
|
Sicelo: |
|
Maajied: |