Organized crime but also hackers with a pure interest in destruction attack millions of Internet facing customer networks daily. Hackers don’t care whether the target is a Fortune 500 company or a small online flower shop. Just because the business is small doesn’t prevent it from being attacked. Every system, which is exposed to the Internet shares an equal risk of being hacked. If you care about your IT infrastructure and you want it safeguarded, you should regularly have vulnerability assessments performed.
95% of all Systems and Web Apps have vulnerabilities.
Our service checks either or both network components like firewalls, routers and servers as well as web application components such as websites, portals and restricted web access systems. The goal of the assessment is to find loopholes in security, which would allow an intruder to gain unauthorized access. The checks include the search for known and unknown system or web application vulnerabilities, missing patch levels, out of date operating systems, out of date software revisions as well as open and exposed ports.
What’s the difference between a Vulnerability Assessment and a Penetration Test?
A Vulnerability Assessment is the first part of a Penetration Test. During a vulnerability assessment, the customer receives a report which outlines all different vulnerabilities encountered, advices on missing patch levels, out of date hardware and software and provides mitigation advice to close the loopholes down.
A Penetration Test on the other hand will also try to actively hack all systems where vulnerabilities have been encountered. For small businesses a Vulnerability Assessment is usually sufficient. A vulnerability system is non-intrusive, which means no harmful actions against the tested systems are being performed.
Vulnerability Assessment Services
IT landscape changes at rapid speed. Businesses use a lot of open source software, don’t maintain latest software revisions, have unnecessary services and port exposed to the Internet but are unaware of the security holes they are introducing. We offer different types of vulnerability assessments to address all security aspects:
- Network Vulnerability Assessments
- IoT Vulnerability Assessments
- Web Application Vulnerability Assessments
- Wireless Assessments
- Mobile Application
- Cloud Vulnerability Assessments
- Social Engineering