Vulnerability Assessments
Hundreds of new vulnerabilities are being discovered annually, dozens of new patches are being released monthly, and thousands of systems are already behind the security eight ball. It is practically impossible to patch every hole before an attacker can find a hole to get into your environment. We use tools that automate the vulnerability discovery process to find the vulnerabilities on your systems before the bad guys do. Vulnerability assessment constitutes just one of the many lines of defense your company should deploy.
Our vulnerability assessment includes:
- Fast and thorough discovery of security vulnerabilities to quickly identify systems and applications at risk
- Prioritized vulnerability and complete remediation information, allowing administrators to take proactive measures to effectively repair vulnerabilities most at risk
- Elimination of false positives and findings de-conflictions
- Utilizes the industry-leading vulnerability tools
We asses the following platforms and protocols:
- Operating Systems: Windows, Linux, Unix, Solaris, HPUX, Novell and Netware
- Web Servers: Apache and Microsoft IIS
- Mail servers: Generic SMTP/POP, MS Exchange, Lotus Domino and Sendmail
- Firewalls: Checkpoint Firewall 1, Cisco PIX, Guantlet and Raptor
- Databases: Oracle, Sybase, MS SQL, PostgreSQL, MySQL
- Network Devices: Routers, Switches, and Hubs
- Protocols: SMB, RPC, SNMP, SSH and VNC
- FTP Servers