The vulnerability scanning test is offered to organizations that are only interested in scanning network resources and analyzing any detected vulnerabilities or configuration errors, without conducting full penetration tests and verification of system vulnerabilities to cyber attacks.
Scope of work:
- Reconnaissance – detectability of platforms, versions of systems, available services
- Scanning vulnerabilities with professional software
- Verification of identified vulnerabilities
Execution method:
- An external test of up to 16 IP addresses
- A short summary report in Polish, with attachments containing the results of work of applied tools in English
Benefits:
- Reliable and objective information on the current status of the company’s IT security
- A ready set of recommendations for eliminating threats together with a recommendation for implementation
- Effective spending of budgetary funds by directing investments to areas that really require improvement and reducing security management costs through effective, proactive identification and assessment of threats
- Enhancing the accuracy of business decisions through a precise understanding of the organization’s security status
- Minimizing the risk of reputational damage caused by information leaks and potential legal consequences
Additional information:
- All the vulnerabilities identified will be grouped by risk (the standard: Common Vulnerability Scoring System – CVSS) and marked in the most popular standards (OVAL, CVE) with references to the description of a vulnerability and manufacturers’ newsletters. The report will also include instructions on how to solve a problem with links to patches and fixes or proposals for configuration changes to eliminate/reduce the risk