This is the process of identifying, quantifying, and prioritizing the risks/vulnerabilities in a computer, network, or communications infrastructure. A risk assessment system will look at the network and pinpoint the weaknesses that need to be fixed/patched before they ever get breached. With over hundreds new vulnerabilities announced each week, a company’s network is only as secure as its latest vulnerability assessment.
Why do it.
The true benefit of vulnerability assessment is that it is a powerful proactive process for securing an enterprise network. With Risk assessment solutions potential security holes are fixed before they become problematic, allowing companies to fend off attacks before they occur.
When should you do it?
Unless you have performed one recently, and have amended all known vulnerabilities, the time to do it is now.
Our team will utilize best breed of tools to detect and identify technical vulnerabilities that can be exploited by intruders to gain access to the network. Once the assessment has been completed, our team analyses the findings and a full report is provided, identifying your current risk levels, and recommending the appropriate countermeasures.
The service is based on the number of externally facing IP's which you would like tested examples of these could be your office Internet connection or an externally hosted website. Other network elements, which can be tested, include dial-up, Remote Access Services (RAS) and virtual private network access points (VPN).