Vulnerability assessments

Vulnerability assessments (continuous)
Vulnerability assessments are used to detect software vulnerabilities in your systems so they can be mitigated in a controller manner before they can be exploited by hackers. Vulnerabilities are rated on a scale from “Low” to “Critical” and we will notify you and your IT department / IT provider immediately about any “High” or “Critical” vulnerabilities found.
Our vulnerability software scans all your devices (e.g. servers, PCs and laptops) on a daily basis and your network devices (e.g. firewall, routers, network switches etc.) on a weekly basis and reports its findings to us.
We will also present you with a report from the system twice annually and work with you your IT department / IT provide to resolve any persistent issues which pose a risk to your systems.
Vulnerability assessments (point-in-time)
A point-in-time vulnerability assessment uses the exact same technology and methodology as above but as the name suggests it is carried out once, generally over the course of 4-6 weeks. The is useful to diagnose unknown vulnerabilities in a system particularly after significant systems change e.g. moving from on-prem servers to the cloud etc. We recommend that vulnerability assessments be carried out on a continuous basis in order to keep pace with the ever-changing security landscape.