Vulnerability Assessments
Vulnerability assessments provide insight into vulnerabilities affecting your internal and external networks. It helps to identify and quantify the potential risks threatening your environment.
Vulnerability assessments provide insight into vulnerabilities affecting your internal and external networks. It helps to identify and quantify the potential risks threatening your environment.
Vulnerability assessment is the process of identifying, classifying and prioritizing weaknesses in the assets in scope. These assets could be infrastructure, applications and/or devices. Defendza offers this exercise with a hint of human intelligence added to remove false positives. However, this is not a concentrated manual effort as demonstrated via penetration testing.
Don't make a mistake of buying a vulnerability scan disguised as a vulnerability assessment. The goal of the vulnerability assessment is to scan and provide a list of vulnerabilities affecting your network, and explain the attack impacts and likelihood of exploitation.
Get in touch to discuss this in-depth with one of our security experts.
Security researchers such as freelancers, bug bounty companies are finding bugs regularly. Regular vulnerability assessments are one of the important ways to identify and quantify the potential risks threatining your environment.
Manual penetration tests are not only time consuming, but also cost intensive as they are focussed and include exploitation of vulnerabilities. Vulnerability assessments are a useful way to assess larger networks regularly in shorter time periods and are a useful way to prepare for penetration testing.
We take customer communication as seriously as reporting or assessment execution. We engage with customers during all stages, and ensure that customer contacts are up to date in the language they understand. Post engagement, a free debrief is conducted to help the customers understand the weaknesses and prepare a mitigation plan.
The assessment-execution phase is followed by the analysis & reporting. Defendza performs analysis on the testing output, evaluates the risk impact and likelihood of exploitation in realistic scenarios before providing action plans to remediate the identified risks. All our reports address business as well as the technical audience with supporting raw data, including mitigation measures at strategic and tactical levels.
The prioritised list of targets is scanned for vulnerabilities. This assessment involves checking both published as well as undocumented vulnerabilities against the target assets. We sift through the scan results for false positives. The manual assessment ensures that only verified vulnerabilities are focused upon.
This phase includes running vulnerability scanner excluding any dangerous plugins to find weaknesses in the scoped systems. This exercise is scheduled in automated fashion unless explicitly agreed to limited timescales with a customer.
In this phase, we profile the target, i.e. a network, a server, or a device. This is a non-intrusive exercise and involves activities like analysing the network, understanding the different assets and services, operating systems, programs in use, and anything related to network layout. This is a fundamental step and helps to prepare for the next stage of finalising targets and finding weaknesses.
Client service underpins everything we do.
Our advisory services follow a 'no surprises' approach offered with clear and concise communication. All the proposals are customised centering on project-based requirements as captured during the scoping discussions.
Our reports are comprehensive and include all the evidence that supports our findings. We give you a risk rating that considers how likely an attack is as well as the impact it could have. We don’t create panic scenarios. Our mitigation is detailed, covering both strategic and tactical areas to help our clients prepare a remediation plan.
Our teams are led by veteran security consultants accredited by CREST standards for the last several years. Our experience shows that our clients are best served by giving them the right advice for their cyber security needs. We do not believe in spreading fear, uncertainty and doubt to generate more business.