Features Managed MDM Configuration Audit Managed Mobile Device Scan Penetration Testing Services Check Technical Details 1. Managed Vulnerability Assessment Packages External Vulnerability Assessment (Black Box) - Scans externally facing hosts. - Scans up-to 65,535 ports of the targeted machine. Internal Vulnerability Assessment - Scans internal networks with many hosts, services, embedded systems including servers and network devices. Credential Vulnerability Assessment - Generally, external network vulnerability scanning provides a timely snapshot of the network services and their vulnerabilities. However, this is only from an external perspective. Accordingly, it is important to determine active local services, and to identify the security exposures from a configuration perspective while identifying the settings that can result in initiating a local attack or in exposing the system to external attacks that are not detected through an external scan. 2. Managed Web Applications Assessment We assess the security of the web applications to identify flaws that can threaten online services, or jeopardize the confidentiality of the information, including: Identifying OWASP TOP 10 Risks, and OWASP vulnerabilities, scan for SQL Injection, XSS, CSRF, URL redirection, and learn how to mitigate these threats. 3. Managed Compliance & Configuration Audit To ensure IT assets compliance with policies and standards, we provide more than 450 audit policies for a wide range of assets and standards, including: Operating systems Databases Applications Network infrastructure Virtual infrastructure Sensitive content Anti-virus Our audit policies have been certified by the Center for Internet Security (CIS). 4. Managed MDM Configuration Audit Gain control over BYOD policies (bring your own device). We ensure that MDM policies are correctly set in accordance with industry standards. (MDM: mobile devices management for tablets, laptops, and smartphones). 5. Managed Mobile Device Scan Network-based scanning is not the right approach to identify vulnerabilities on mobile devices, since most devices are in “sleep” mode, and/or using a 3G/4G network. We access mobile devices via Microsoft Exchange or MDM to gather information about the type of devices, users, and mobile device vulnerabilities. 6. Penetration Testing Services Pen testing simulates a real hacker activity on networks, applications, devices, and/or people to evaluate the security level of key systems and infrastructure to determine what is needed to boost systems security. Benefits We provide a timely snapshot of the network services and their vulnerabilities We assess the security of the web applications to I dentify flaws that can threaten online services we provide more than 450 audit policies for a wide range of assets and standards.