Network (Internal) Security Vulnerability Assessment
Network Security Penetration Test
243 days is the average amount of time a hacker is in a network before being discovered
Speak to the Risk Factory Foreman, and he'll tell you everything you need to know.
Call us on 0800 978 8139
Using special scanning software, a Network Security Vulnerability Assessment identifies security weaknesses such as configuration flaws, excess builds, missing security patches, updates or fixes or programming errors on your internet facing systems. It will also examine how your servers appear to users on the internet and pinpoint where information is being exposed which could be exploited by hackers to gain access to your systems and compromise your data.
You should do it to “see what a hacker sees”. Conducting this assessment will show you any existing Internet-facing weaknesses that could be exploited by hackers to access your systems. It should give you a clear picture of the security profile of your systems as seen from the Internet.
Vulnerability scanning is also internationally recognised best practice and required for compliance to virtually all governance risk and compliance frameworks.
Best practice endorses conducting vulnerability scanning of your systems once every 3 months (quarterly) and after any major changes.
We just need a list of your internet facing Internet Protocol (IP) addresses. If you don’t know your IP addresses, don’t panic our Factory Foreman can help you.
Also, don’t forget to specify the exact number (quantity) of assessments you’d like to purchase when getting your quote. Our Factory Foreman will call you to schedule each assessment purchased. You can for example, purchase multiple assessments (for better value) and get them delivered over time when you need them to match your ongoing business requirements.