VULNERABILITY ASSESSMENT
Fully assess your organization’s threat detection and response capabilities with a simulated cyber-attack.
If you store data on your organization’s network, you want to keep the network as secure as possible, without any vulnerabilities that can be exploited by attackers; therefore, you need to identify holes and weaknesses in your network.
Vulnerability scanning, also commonly known as ‘vuln scan,’ is an automated process of proactively identifying network, application, and security vulnerabilities. Vulnerability scanning is typically performed by the IT department of an organization or a third-party security service provider. This scan is also performed by attackers who try to find points of entry into your network. CSG is a leading provider of end-to-end cybersecurity, digital forensics and breach response services. Our Cyber Incident Response experts are skilled at mitigating the damaging effects of cyber-attacks and help businesses efficiently recover from incidents with minimal business disruption and your reputation intact.
CSG’s vulnerability assessment service has many benefits to help protect your environment and provide a proactive stance against threats to your organisation including:
External vulnerability scan
External vulnerability scans target the areas of an IT ecosystem that are exposed to the internet, or not restricted for internal use. These areas can include applications, ports, websites, services, networks, and systems that are accessed by external customers or users
Internal vulnerability scan
With internal vulnerability scans, the primary target of the software is the internal enterprise network. Once a threat agent makes it through a security hole, the threat agent can leave enterprise systems prone to damage. These scans search for and identify the vulnerabilities inside the network in order to avoid damage, as well as to allow organizations to protect and tighten systems and application security that are not exposed by external scans
Environmental scan
Environmental vulnerability scans are based on the specific environment of an enterprise’s technology operations. These vulnerability scans are specialized and are available to deploy for multiple technologies, such as IoT devices, websites, cloud-based services, and mobile devices.
Non-Intrusive
Intrusive Scan
Intrusive assessments make attempts to exploit vulnerabilities after they are discovered during scanning and an attack plan is created.