SECURITY
ASSESSMENT

Vulnerability Assessment

Vulnerability Assessment aims to highlight vulnerable parts within the network serving as potential sources of risk. Weaknesses often stem from gaps found in infrastructure, incomplete updates and configurations, or incorrect procedures. During a Vulnerability Assessment, a detailed security examination is carried out into the vital parts of the network, seeking for vulnerabilities in applications and systems.

Vulnerability Assessment includes the following steps:

  • Reconnaissance checks captures the overall picture of the network and its systems, documenting active IPs and the associated open ports.
  • Detection of applications using these open ports.
  • Identification of application versions.
  • Scanning for known vulnerabilities within these versions.
  • Automated scans for errors in application configuration

With the completion of the assessment, a detailed Report of the findings and the risks arising from them, alongside recommended remedial actions is provided.

Benefits
for the company