Vulnerability Assessment
A vulnerability assessment can be performed on software components or on network infrastructures.
In case of applications we look for easy-to-spot vulnerabilities and known vulnerabilities on app dependencies.
In case of networks we perform a ‘look but don’t touch’ scan to identify security weaknesses and priorities.
Our unique approach combines specialised automated scanning tools that we’ve developed and skilled human oversight.
A common issue in many Vulnerability Assessments is a large number of ‘False Positives’ These are vulnerabilities that are highlighted by a scan, but have already been addressed by other means that the scan doesn’t detect. False positives can often lead to your internal IT team wasting significant time chasing down imaginary vulnerabilities.
Our methodology minimises false positives, saving you time and allowing you to focus more quickly on your prioritised security issues.
Depending upon the results, Vulnerability Assessments are often followed up by targeted Security Research.
Here’s how we’ll work with you…
First of all, we’ll clarify exactly what you need assessed; it’s usually just a few simple questions.
Then we carry out the Vulnerability Assessment in accordance with the scope and time frame we’ve agreed. It doesn’t usually take too long.
Once complete, we’ll securely send you the outcome.
If you need assistance with resolving any issues we’ve found, we can help with that too.