bridging the gap between technology and the people who use it


VS-i

Managed Internal Vulnerability Scanning Services

Servers

Assess and detect vulnerabilities across all areas of your IT environment on a continuous basis. This service is managed and supported by security experts and scans network assets to ensure sensitive information and systems are protected against threats and exploits from hackers and others with malicious intent.

 

The VS-i provides vulnerability scanning of critical internal devices that sit behind the corporate firewall to keep you apprised of your IT environment’s internal security posture. When used with the VS-e, VS-i provides an organization with a clear view of their vulnerability profile from the inside and outside of their network. Once installed, the VS-i examines internal database, intranet, Web DHCP (Dynamic Host Configuration Protocol), e-mail, file-sharing and any other network assets. The VS-i solution leverages an up-to-date vulnerability database comprised of the SANS Top 20 and more than 5,000 other vulnerabilities to determine your organization’s susceptibility to the latest threats.



What are the Benefits of a VS-i?

  • Enhance your organization’s security posture
  • Facilitate compliance
  • Protect your business, brand and reputation
  • Increase confidence in your IT organization
  • Identify process improvements

 

How does the Process Work?
A security professional will work with your IT team to determine the scope of the vulnerability scan. The scope will include the internal addresses to scan and a schedule for the scan to run. Our engineers will pre-configure the VS-i appliance to your environment’s specifications and ship the appliance to your location for easy installation.

 

A report is generated after each scan runs. This report is reviewed by a security professional before it is provided to you. A security professional is available to discuss any of the findings with you as well as recommend remediation.

 

Get a quote


Getting Results
What started out as a problem with one router is turning into a much larger problem. It started with the Linksys WAG200G, but now more impacted routers are being discovered. The problem is there is a vulnerability that read more ...
A Virginia Tech official Tuesday blamed human error for a data breach that may have exposed sensitive data on about 145,000 people who applied online for jobs at the school over the past 10 years. The compromised data read more ...
LAS VEGAS -- The future of privacy and the cloud occupied a sidestage at CES 2013 this morning, with one panelist comparing privacy lost to something else that can't be replaced. "Getting your privacy back is like get read more ...
In the biggest data compromise of the year, Social Security Numbers (SSN) belonging to about 3.6 million residents in South Carolina have been exposed in an intrusion into a computer at the state's Department of Revenu read more ...
Last week, the director of Utah's Department of Technology Services (DTS) resigned in the wake of a massive data breach that exposed the personal information of nearly 800,000 people to hackers believed to have been in E read more ...
Austrian police have arrested a 15-year-old student suspected of hacking into 259 companies across the span of three months. Authorities allege the suspect scanned the Internet for vulnerabilities and bugs in websites an read more ...
The Flashback Trojan that infected over 600,000 Apple Macs was quickly followed by the discovery of two other Mac-specific Trojans: one that also exploited Java and another that exploited Microsoft Word. The resulting hu read more ...
Hewlett-Packard officials are saying that the number of vulnerabilities in commercial applications is continuing to fall, dropping almost 20 percent between 2010 and 2011. However, while the downward trend in vulnerab read more ...
The attack on Kernel.org last month was a big wake-up call, according to Green Armor's Joseph Steinberg. This breach could have been astronomically worse. If the attack had been carried out with more sophistication, the read more ...