The scan will be done internally and externally by attempting to identify any vulnerabilities listed in the CVE (Common Vulnerability Exposures) database. This light-touch scan has the capability to quickly show you potentially exploitable assets on your network.
It’s important to do this regularly, as vendors make their legacy products EOL (End of Life), they will no longer receive security updates, and therefore will eventually become vulnerable to attack and infiltration.
We place a probe inside your network, which constantly scans on-network devices and looked for these common issues. It can also be used to identify members of privilege groups in AD, as well as identify missing patches of operating systems and 3rd party software.
Reports are both granular and presentable to senior management. Giving you the best possible chance to gain approval to remediate the issues. If you need a little extra assistance, we’ll prepare and deliver a board-level presentation of our findings too.
Are your systems protected?
At the heart of every vulnerability management solution, there is a robust process which ensures full accountability for each step:
Identification – We’ll scan devices on your network for any CVE (Common Vulnerability Exposures), and trend them against current threats out in the field.
Evaluation – Once a vulnerability has been identified, our experts will evaluate each for its legitimacy. This will give you a 100% accurate picture of your threat landscape.
Treatment – We wont just find your vulnerabilities, we’ll help you fix them, and prevent them re-occurring too!
Report – Vulnerabilities range in type, but some may require a capital business case to raise money to fix them. Our reports can be geared towards both technical personnel, as well as senior management.
Re-test – After all that hard work, you don’t want to caught out in months to come with a new vulnerability. We’ll keep a constant eye on your estate via one of our embedded Skynet sensors.
In 2020 18,325 new vulnerabilities were added to the CVE (Common Vulnerability Exposure) database. This is the highest ever recorded figure to date. Any of these exposures could lead to a compromise on your network, and lead to data reputational loss or damage.