Vulnerability Assessment
Automated tools are utilized to detect and identify weaknesses on your network, web servers and applications that hackers could exploit, by relying on a database of known security vulnerabilities
What is Vulnerability Assessment?
Vulnerability assessment is the use of automated tools to identify known security vulnerabilities in your environment. It checks whether the minimum level of security settings have been switched on and the appropriate security patches have been deployed
In general, we recommend Corporates to exercise the best practice to perform vulnerability assessment at least once every quarter. This is particularly the case when there’s major system, organization or infrastructure change or a need for compliance
When do you need it?
Once every quarter
Types of Vulnerability Assessment Scans
Network-Based Scans
(Unauthenticated)
Identifies possible network security attacks and vulnerable systems on networks
Application Scans
Detects known software vulnerabilities and mis-configurations in mobile or web apps
Host-Based Scans
(Authenticated)
Finds vulnerabilities in workstations, servers, or other network hosts, and provides visibility into configuration settings and patch history
Source Code Scans
Makes the remediation process faster and easier by pinpointing the exact locations of vulnerabilities in the program code