Objective of Vulnerability Assessment Service
- Identifying the security weaknesses and vulnerabilities in your organization’s IT assets.
- Classify the discovered vulnerabilities according to severity.
- Provide remediation actions to improve security.
Scope of Service
The scope of service includes all the IT assets connected to the organization’s network. It also provides insights into your current state of security and the effectiveness of countermeasures. We perform assessments in the following formats to implement an effective and in-depth analysis.
· External Vulnerability
This assessment requires no internal access and is performed remotely. Our experts identify and classify the weaknesses of your internet-facing IT assets, such as web applications, network points, web servers, e-mail servers, and VPNs.
· Internal Vulnerability
The internal assessment needs to be performed within the premises of your organization. This assessment allows you to check your compliance with global or local policies, standards, and procedures in terms of information security, segmentation of networks, and data protection.
Assessment Method
We follow the industry’s best practices for network vulnerability assessment, including the following methods:
- Black Box- The external network perimeter is the starting point for scanning.
- White Box- Scanning network vulnerabilities from the inside.
- Gray Box- Searching vulnerabilities within the network.