Vulnerability Assessment identifies known vulnerabilities in ICT infrastructure by using automated assessment mechanisms.
Vulnerability Assessment
The interplay between Vulnerability Assessment and Penetration Testing
Vulnerability Assessment identifies known vulnerabilities in ICT infrastructure by using automated assessment mechanisms. It is often associated with, and integrated in, Penetration Testing.
While the assessment process is limited to exposing weaknesses in a system, Penetration Testing goes beyond and tries to exploit these weaknesses.
How does it work?
Our Vulnerability Assessment service performs an automated scan and then prioritizes the identified vulnerabilities on the basis of their impact, severity and likelihood. The main goal is to identify those vulnerabilities which have the potential to expose your assets to data loss or security breach.
Scope and output
Depending on the target our assessments are divided in several categories:
- Network-based scans;
- Host-based scans;
- Wireless scans;
- Database scans;
- Application scans.
The final deliverable is a report generated by an automated scanner and then proofread and approved by our experts. The report also includes a summary, classification of the identified
vulnerabilities and recommended actions for their remediation. The service is available on a recurrent basis in keeping with the vulnerability assessment process and best practices.
Vulnerability Identification
Analysis
Risk Assessment
Remediation
We are experienced and ready to help you take your cybersecurity to the next level.