Is Your Business Secure From Cyber Threats?
Every device, website, and application on your network can be an entrance point for cyber threats. Our proven vulnerability assessment service uses automated tools to scan your infrastructure, identify any vulnerabilities, and we leverage our IT security expertise to offer remediation suggestion to close these gaps.
Our Vulnerability Assessment includes:
- Infrastructure scan of up to 500 devices connected to your network
- Website security scan
- Firewall configuration analysis
- Review of your antivirus standards, patching process and wireless networks configuration
Our Vulnerability Assessment Process
A Resolute security specialist will use automated tools to scan for vulnerabilities in these key areas. Using a repeatable proven process, we’re able to keep costs down and offer a flat fee for this Vulnerability Assessment service (if you meet criteria listed in the service agreement).
Once complete, we’ll review and provide you with an executive summary of key findings, a detailed report with recommended remediation actions to address any vulnerabilities, and a consolidated list of key recommendations along with relative indicators of risk and effort to remediate.
An example Risk Report card generated based on a sample Vulnerability Assessment.
We’ve developed a collection of assessments, scans and analysis which uncover the primary gaps in your businesses cybersecurity.
We set up and run automated tools to check for the presence of known vulnerabilities, configuration issues and malware in your current IT environment.
The vulnerability assessment includes four components:
Using industry leading vulnerability software, we scan powered-on network-connected devices (servers, workstations, firewalls, etc.) for over 96,000 known vulnerabilities, configuration issues and malware. As added value, we report on additional key information about your environment (such as missing Windows patches) when applicable.
We scan internal and external websites for known vulnerabilities such as SQL injection, cross-site scripting, Java risks and over 4,500 other vulnerabilities. A prioritized remediation action list is generated for vulnerabilities with known resolutions.
We audit firewall configurations using leading software against industry standard benchmarks. Your firewall configurations will also be checked for known vulnerabilities and we’ll prioritize any necessary actions that should be taken to improve your current set-up.
IT Practices Review
We review your antivirus standards, patching processes, and wireless networks configuration, against best practices and highlight any problem areas.
At the end of this extensive assessment, we will provide detailed reports of key findings and recommended remedial actions. All findings and recommendations are scored on level of RISK to your business and amount of EFFORT involved to fix the identified vulnerabilities. There is a flat fee cost for this assessment as long as you meet the criteria listed in the service agreement pertaining to number of devices, locations, websites, and firewalls.
If you are outside of the ranges included in the flat fee assessment, we can work with you to develop a custom assessment that meets your business requirements. With your identified vulnerabilities and recommended actions your team will have a task list for how to protect your business from the most pressing threats to your network and systems.
If you are looking for further guidance on how to develop a strategy to tackle these problem areas, we have experienced IT professionals who can put a cybersecurity action plan in place.
Request a free security consult today to find out what will work best for your business.