Scanning your network and systems for vulnerabilities which an attacker might use against you.
The Vulnerability Assessment is probably one of the most common cyber security checks to be undertaken. They enable your network and systems to be checked and to identify ways which an attacker might use against you.
For our adhoc vulnerability scans, choose from our 'Raw,' 'Lite Touch,' and 'Fully Analysed' service packages to find a competitively priced service level to meet your specific needs.
Raw: You receive the results directly from the scanning tool and have to interpret them yourselves, a level of cyber security expertise is required on your part.
Lite Touch: Our experts will go through the report and provide an overview of the findings, a level of IT knowledge is required on your part.
Fully Analysed: Our analysts will review the output and work with you to prioritse the results and any remediation which might be required
A vulnerability assessment or penetration test will provide you with a snapshot of the vulnerabilities you are exposed to at the time the test was undertaken. If a new vulnerability is released or your equipment is misconfigured after the test, you will be exposed until your next test is performed. If your tests are only scheduled annually, this window of exposure could be extensive. Our Managed Vulnerability Assessment Service are usually performed weekly or monthly and will greatly reduce this exposure.
An extension to our service is the use of Vulnerability Assessment agents which can be installed on hosts and provide near real-time visibility of arising vulnerabilities. This is especially popular with clients who have remote or homeworking staff
Many websites now include interactive content which enables the visitor and the website host to derive maximum benefit from the visit through dynamic content. This is often achieved through the medium of a Website Application which runs in the browser that the visitor is using. In order to achieve the desired benefit, the Web App is given access to the backend of the website and, if this isn't handled correctly, could be exploited by an attacker.
Our Webite Application Scanning (WAS) service utilises industry-leading tools to scan your web apps for vulnerabilities that hackers could leverage against you. The output is a report detailing any findings along with recommendations on how to remediate any issues that were found.
Our Managed Web App Scanning Service will check your web app monthly, or more regular if you prefer
Our analysts will also examine your organisation's online presence for data leakage and risk. This will be performed not only on the "normal" Internet but also the Deep and Dark Web which isn't as accessible. Finally, a domain level search for any email addresses which have been exposed in public breaches will be undertaken.