Network (Internal) Security Vulnerability Assessment

Services clients purchase before

Information Security Threat & Risk Assessment

Services clients purchase after

Network Security Penetration Test

Factory Fact

243 days is the average amount of time a hacker is in a network before being discovered

Need some help?

Speak to the Risk Factory Foreman, and he'll tell you everything you need to know.

Call us on 0800 978 8139

Quote details

What is it?

Using special scanning software, this Network Security Vulnerability Assessment identifies the security configuration weaknesses and flaws on the internal devices deployed on your system. It assesses the security integrity of the devices deployed internally on your network identifying the vulnerabilities that could be exploited by authorised system users as well as hackers who have gained unauthorised internal access.

Why should I do it?

You should do it to understand what your in-house weaknesses are. Conducting this assessment will show you the quality of your house keeping evidencing the value of your systems security administration efforts. 

It also identifies internet-facing weaknesses that could be exploited by authorised system users or hackers who have accessed your systems and are looking to escalate their privileges.

Internal vulnerability scanning is also internationally recognised best practice and required for compliance to virtually all governance risk and compliance frameworks.

How often should I do it?

Best practice endorses conducting internal vulnerability scanning of your systems every 3 months (quarterly) and after any major changes. 

What will Risk Factory do?

  • Identify how many devices are connected to your system.
  • Identify what operating systems, services and applications these devices are running.
  • Identify security vulnerabilities associated with the operating systems, services and applications.
  • Test each of the vulnerabilities identified against our database of known threats and attacks.

What will I receive?

  • A comprehensive report of the findings detailing a straight-forward explanation of each vulnerability identified and our cost-effective recommendations for mitigating each vulnerability. To see a sample report just contact the Risk Factory Foreman.
  • On-call telephonic support from an information security consultant for two weeks after the scanning to answer any questions you may have about the report or remedial recommendations.
  • A free rescan two weeks after the original scan to ensure recommended remedial actions were effective in mitigating the vulnerabilities originally identified.
  • A certificate of validation for evidence of compliance.

Do I need to prepare anything in advance?

We just need a list of your internal-facing Internet Protocol (IP) addresses. If you don’t know your IP addresses, don’t panic our Factory Foreman can help you.

Also, don’t forget to specify the exact number (quantity) of assessments you’d like to purchase when getting your quote. Our Factory Foreman will call you to schedule each assessment purchased. You can for example, purchase multiple assessments (for better value) and get them delivered over time when you need them to match your ongoing business requirements.