Vulnerability Assessments

Vulnerability Assessments are becoming a requirement in some sectors and are required for PCI-DSS compliance.

Regular comprehensive scans of your company network and devices are the most effective measure you can take to understand your current cyber vulnerabilities and keep your data secure.

We can conduct scans on your behalf on a weekly, monthly, quarterly or yearly basis based on your requirements.

After each assessment you will receive a executive summary report and a comprehensive technical report that provides details of vulnerabilities and how to remediate them in a prioritised order.

Penetration test vs Vulnerability Assessment what’s the difference?

Penetration Test

  • Attacker has no knowledge of your network.
  • The purpose of penetration testing is to determine whether a detected vulnerability is genuine.
  • If a penetration tester manages to exploit a potentially vulnerable spot, he or she considers it genuine and reflects it in the report.
  • The report can also show unexploited. vulnerabilities as theoretical findings. 
  • Varying levels of complexity can include phish attacks and malware on business systems
  • Intrusive and can cause system downtime.

Vulnerability Assessment

  • Information is provided on IP addresses and what is in scope for the assessment.
  • Vulnerability assessment intends to identify vulnerabilities in a network.
  • The technique is used to estimate how susceptible the network is to different vulnerabilities.
  • Vulnerability assessment involves the use of automated network security scanning tools,
  • Results are then listed in the report.
  • As findings reflected in a vulnerability assessment report are not backed by an attempt to exploit them, some of them may be false positives.

We provide a variety of vulnerability and penetration testing services tailored to your needs please contact us to find out more.

Contact Us

IASME Gold Certified

Vulnerability Assessments

Vulnerability Assessments are becoming a requirement in some sectors and are required for PCI-DSS compliance.

Regular comprehensive scans of your company network and devices are the most effective measure you can take to understand your current cyber vulnerabilities and keep your data secure.

We can conduct scans on your behalf on a weekly, monthly, quarterly or yearly basis based on your requirements.

After each assessment you will receive a executive summary report and a comprehensive technical report that provides details of vulnerabilities and how to remediate them in a prioritised order.

Penetration test vs Vulnerability Assessment what’s the difference?

Penetration Test

  • Attacker has no knowledge of your network.
  • The purpose of penetration testing is to determine whether a detected vulnerability is genuine.
  • If a penetration tester manages to exploit a potentially vulnerable spot, he or she considers it genuine and reflects it in the report.
  • The report can also show unexploited. vulnerabilities as theoretical findings. 
  • Varying levels of complexity can include phish attacks and malware on business systems
  • Intrusive and can cause system downtime.

Vulnerability Assessment

  • Information is provided on IP addresses and what is in scope for the assessment.
  • Vulnerability assessment intends to identify vulnerabilities in a network.
  • The technique is used to estimate how susceptible the network is to different vulnerabilities.
  • Vulnerability assessment involves the use of automated network security scanning tools,
  • Results are then listed in the report.
  • As findings reflected in a vulnerability assessment report are not backed by an attempt to exploit them, some of them may be false positives.

We provide a variety of vulnerability and penetration testing services tailored to your needs please contact us to find out more.

Contact Us

IASME Gold Certified

Social media & sharing icons powered by UltimatelySocial