top of page

Vulnerability Assessment

Automated tools are utilized to detect and identify weaknesses on your network, web servers and applications that hackers could exploit, by relying on a database of known security vulnerabilities

What is Vulnerability Assessment?

Vulnerability assessment is the use of automated tools to identify known security vulnerabilities in your environment. It checks whether the minimum level of security settings have been switched on and the appropriate security patches have been deployed

In general, we recommend Corporates to exercise the best practice to perform vulnerability assessment at least once every quarter. This is particularly the case when there’s major system, organization or infrastructure change or a need for compliance

When do you need it?

Once every quarter

Vul Assess Page_Icon_1.png

Types of  Vulnerability Assessment Scans

Vul Assess Page_Icon_2.png

Network-Based Scans
(Unauthenticated)

Identifies possible network security attacks and vulnerable systems on networks

Vul Assess Page_Icon_4.png

Application Scans

Detects known software vulnerabilities and mis-configurations in mobile or web apps

Vul Assess Page_Icon_3.png

Host-Based Scans
(Authenticated)

Finds vulnerabilities in workstations, servers, or other network hosts, and provides visibility into configuration settings and patch history

Vul Ass_Type_Icon.png

Source Code Scans

Makes the remediation process faster and easier by pinpointing the exact locations of vulnerabilities in the program code

Desktop - 1.png
Vul Assess_Deliverables_Icon_1.png

A final report includes executive summary, scope, findings, evidence and recommendations

Vul Assess_Deliverables_Icon_3.png

A follow-up sheet to keep track of remediation progress

Vul Assess_Deliverables_Icon_2.png

A presentation (remote/physical) of findings

Vul Assess_Deliverables_Icon_4.png

A regular vulnerability assessment plan can be offered (optional)

Our Vulnerability Assessment Deliverables

bottom of page