Enterprise Vulnerability Risk Scan2021-06-24T12:38:38+00:00

Vulnerability Risk Scanning for Enterprise Companies

Continuous Vulnerability Scan is an important vulnerability management component and an integral part of threat modeling. It provides a vendor-neutral vulnerability security baseline that is essential in closing security risk gaps and alignment with regulations.

Our vulnerability risk scan report contains a description of the vulnerability, its location, and suggested mitigation steps.

Our penetration testing and vulnerability scanning and assessment methodology relies upon following industry best practice standards:

PTES Testing Guide

The Penetration Testing Execution Standard document defines the methods and process of executing a network penetration test. The guideline is designed to provide a common language and scope for performing penetration testing, as well as detailed technical guidelines, to both businesses and security service providers. For additional information, please refer to:

Learn more

OWASP Testing Guide

The Open Web Application Security Project’s Testing Guide document defines the industry best practice web application penetration testing methodology. The value in using this document as a reference on the possible prevalence, exploitability, impact and detectability of a particular class of vulnerabilities, helps us focus on finding the most prevalent and detectable vulnerabilities that could have the most significant security impact. For additional information, please refer to:

Learn more

Enterprise Questionnaire

/10

1 / 10

Do you have a prepared and tested Business Continuity/Disaster Recovery plan?

2 / 10

Do you have a prepared and tested Incident Response Plan (including handling, monitoring and reporting of the incident)?

3 / 10

If you are developing in software/applications, have you implemented a secure software development lifecycle?

4 / 10

Are you performing vulnerability assessments, penetration testing and vulnerability management on information system assets (network, website, endpoints, servers, software, web applications, etc)?

5 / 10

Are you performing regular inventory of all IT assets (hardware and software)?

6 / 10

Are you following a formal configuration management, patching and change control process?

7 / 10

Do you have a documented and standardized process for hardening systems and hosts, and is this process automated via a configuration management system?

8 / 10

Do you actively manage supply chain security risk and enforcing third party risk management?

9 / 10

Are you employing anti-malware and other security controls such as firewall, data loss prevention, intrusion detection/prevention systems across your environment?

10 / 10

Do you collect, monitor and analyze yoursystem, application and security logs in a dedicated, secure, centralized logging solution or a security monitoring system?