VULNERABILITY TESTING
What is Vulnerability Testing?
A vulnerability testing service checks either network components (firewalls, routers, servers, etc.) or web application components (websites, portals, restricted web access systems, etc.). The goal of the service is to find loopholes in security, which would allow an intruder to gain unauthorised access.
Checking network equipment (servers, routers, etc.) for vulnerabilities
Checking web applications (websites, portals etc.) for vulnerabilities
Same methods hackers employ prior to hacking into a client network
What Checks are being performed during a vulnerability test?
The checks include the search for known and unknown system or web application vulnerabilities, missing patch levels, out of date operating systems, out of date software revisions as well as open and exposed ports.
Known and unknown vulnerabilities in network or web application components
Out-of-date software / hardware in use
Missing patches
Open and exposed services and ports
Why is Vulnerability Testing necessary?
Millions of internet facing customer networks are being attacked on a daily basis. If you care about your IT infrastructure and you want it safeguarded, you should regularly have vulnerability assessments performed, before a malicious hacker exploits potential weaknesses.
How many systems actually do have vulnerabilities?
In our assessments we find that 95% of all of our clients have either at least one or more critical, high or medium severity vulnerability.
Why are there so many vulnerabilities?
IT landscape changes at rapid speed. Businesses use a lot of open source software, don’t maintain latest software revisions, have unnecessary services and port exposed to the Internet but are unaware of the security holes they are introducing.
Wrong configuration of servers
Running out of date software / missing patch levels
Weak application coding
Use of open source software
Exposing unneeded ports and services to the internet
Difference between a Vulnerability Test and a Penetration Test
A vulnerability assessment is a series of manual investigation / probing as well as automatic scanning and it reports on all known vulnerabilities and flaws found in systems. A penetration test takes the encountered vulnerabilities and flaws and tries to actively exploit them to gain access to the systems like a malicious hacker would so that the report can fully explain the potential problem you are facing. Microsoft Azure penetration testing, AWS penetration testing and Google Cloud penetration testing are all newer forms of
IT infrastructure security testing in recent years but ethical hacking requirements that our team of testers are well skilled in along with the more established vulnerability testing techniques.
VULNERABILITY TESTING PACKAGES
BRONZE Package
Network vulnerability testing against specified IP enabled devices
Web application vulnerability testing against specified web apps
Service can contain external and internal vulnerability assessments
Executive summaries, in-depth technical report and mitigation advice
One time off or yearly test
SILVER Package
Network vulnerability testing against specified IP enabled devices
Web application vulnerability testing against specified web apps
Service can contain external and internal vulnerability assessments
Executive summaries, in-depth technical report and mitigation advice
Twice a year testing package (10% discounted)
Delta report comparison to the previous report
GOLD Package
Network vulnerability testing against specified IP enabled devices
Web application vulnerability testing against specified web apps
Service can contain external and internal vulnerability assessments
Executive summaries, in-depth technical report and mitigation advice
Quarterly testing package for maximum protection (20% discounted)
Delta report comparison to the previous report
Download Flyer and Sample Reports
References and Certifications
If you would like to speak to one of our existing customers, we are happy to arrange that. Please note that a lot of customers wish to remain anonymous and not to serve as a reference due to the sensitivity of the work we perform. Naturally we always comply with our customers. We do however have some clients who are happy to serve as references. Should you require validation of our consultant’s certifications, we can arrange that as well.