An external vulnerability scan identifies security weaknesses in your internet-facing systems, such as web applications, servers, and network devices. It helps detect potential entry points for cyberattacks before they can be exploited by malicious actors.
We offer two types of external vulnerability scans:
We conduct a comprehensive vulnerability scan and manually review the results to filter out false positives. While this improves accuracy, it is important to note that this is not a full penetration test and does not include active exploitation or in-depth security analysis.
Prerequisites:
To perform the scan, the only prerequisite on your side is to whitelist our scanner’s IP address to ensure uninterrupted access to your external systems.
Outcome:
The outcome of the vulnerability assessment is documented in the form of a report which contains a summary of the high-risk vulnerabilities, visually depicting the overall threat level and a full list of all findings, including technical details and recommendations. This report can be used by management to get an overview of the security posture of the IT environment and represents the basis for technicians to address the identified risks.
An internal vulnerability assessment identifies security weaknesses within your internal network, helping to detect misconfigurations, outdated software, and other vulnerabilities that could be exploited by attackers who gain access to your environment. This proactive approach enhances your overall security posture and minimizes internal risks.
We conduct a comprehensive vulnerability scan and manually review the results to eliminate false positives, ensuring that you receive accurate and actionable insights. Additionally, we offer authenticated scans, which provide deeper visibility into system patch levels and security configurations by using valid credentials to assess internal assets more thoroughly.
Prerequisites:
To perform the assessment, we require either a VPN connection to your internal network or access to a virtual machineor cloud instance that we provide for scanning.
Outcome:
The outcome of the vulnerability assessment is documented in the form of a report which contains a summary of the high-risk vulnerabilities, visually depicting the overall threat level and a full list of all findings, including technical details and recommendations. This report can be used by management to get an overview of the security posture of the IT environment and represents the basis for technicians to address the identified risks.