bridging the gap between technology and the people who use it


VS-e

External Vulnerability Scanning Services

External vulnerability scanning is a test of a company’s network perimeter security. Network perimeter security includes all the devices that protect, control, or provide data to the Internet. Every day, vulnerabilities are discovered that could allow someone to circumvent your network security devices. In addition to these “discovered vulnerabilities”, routine configuration changes could also create security weaknesses. The idea is for you to identify weaknesses in security before someone else exploits them. A scanner will test your network against known vulnerabilities and provide a “fix-it” list of findings. These findings are ranked from High to Low depending on the severity (ease and likelihood) of the vulnerability.

What are the Benefits of a scan?

  • Enhance your organization’s security posture
  • Facilitate compliance
  • Protect your business, brand and reputation
  • Increase confidence in your IT organization
  • Identify process improvements

 

How does the Process Work?
A security professional will work with your IT team or your service provider to determine the scope of the vulnerability scan. The scope will include the IP addresses to scan and a schedule for the vulnerability scan to run. The proprietary scanning engine tests for more than 5,000 network, operating system and application vulnerabilities (including enhanced checks for SQL injection and cross-site scripting vulnerabilities). A report is generated after each vulnerability scan runs. This report is reviewed by a security professional before it is provided to you. A security professional is available to discuss any of the findings with you as well as recommend remediation.

 

Get a quote


Getting Results
What started out as a problem with one router is turning into a much larger problem.  It started with the Linksys WAG200G, but now more impacted routers are being discovered.  The problem is there is a vulnerability that read more ...
A Virginia Tech official Tuesday blamed human error for a data breach that may have exposed sensitive data on about 145,000 people who applied online for jobs at the school over the past 10 years. The compromised data read more ...
LAS VEGAS -- The future of privacy and the cloud occupied a sidestage at CES 2013 this morning, with one panelist comparing privacy lost to something else that can't be replaced. "Getting your privacy back is like get read more ...
In the biggest data compromise of the year, Social Security Numbers (SSN) belonging to about 3.6 million residents in South   Carolina have been exposed in an intrusion into a computer at the state's Department of Revenu read more ...
Last week, the director of Utah's Department of Technology Services (DTS) resigned in the wake of a massive data breach that exposed the personal information of nearly 800,000 people to hackers believed to have been in E read more ...
Austrian police have arrested a 15-year-old student suspected of hacking into 259 companies across the span of three months. Authorities allege the suspect scanned the Internet for vulnerabilities and bugs in websites an read more ...
The Flashback Trojan that infected over 600,000 Apple Macs was quickly followed by the discovery of two other Mac-specific Trojans: one that also exploited Java and another that exploited Microsoft Word. The resulting hu read more ...
Hewlett-Packard officials are saying that the number of vulnerabilities in commercial applications is continuing to fall, dropping almost 20 percent between 2010 and 2011. However, while the downward trend in vulnerab read more ...
The attack on Kernel.org last month was a big wake-up call, according to Green Armor's Joseph Steinberg. This breach could have been astronomically worse. If the attack had been carried out with more sophistication, the read more ...