Vulnerability Assessment is a process to identify the security posture of an IT environment by safely assessing the system to discover vulnerabilities. These vulnerabilities may exist in operating systems, services, applications, misconfigurations or end-user behavior. Such assessments are useful in validating the effectiveness of compliance and asset hardening. Vulnerability Assessment can be performed automated or manual. The process includes gathering information about the target before the scan, identifying running services, registries and rules, evaluating whether it is vulnerable as per standards and reporting the findings. Information about discovered security vulnerabilities are collected and presented to IT and network system managers to help them make strategic decisions and prioritize remediation efforts.
Features | Basic | Advanced | Premium |
---|---|---|---|
Automated tool-based assessment | |||
Tool generated technical report | |||
Automated and manual assessment | |||
Technical Detailed report | |||
Executive Summary Report | |||
PowerPoint presentation on the risks | |||
Total Risk Scoring (TRS) based on Assets and vulnerabilities | |||
Advisory on remediation planning | |||
Revalidation scan |
Perform a vulnerability assessment on Internal / External IP addresses
Enable you to identify the existing security weakness before attackers exploit them
Nessus
NMAP
Nexpose
Burp Suite
Kali
Plus open source tools