Vulnerability Management Solutions simulates a real hacker activity on networks, applications, devices, and/or people to evaluate the security level of key systems and infrastructure to determine what is needed to boost systems security.

Features

Managed MDM Configuration Audit
Managed Mobile Device Scan
Penetration Testing Services
Check
Technical Details

1. Managed Vulnerability Assessment Packages

  • External Vulnerability Assessment (Black Box)
    - Scans externally facing hosts.
    - Scans up-to 65,535 ports of the targeted machine.
     
  •  Internal Vulnerability Assessment
    - Scans internal networks with many hosts, services, embedded systems including servers and network devices.
  •  Credential Vulnerability Assessment
    - Generally, external network vulnerability scanning provides a timely snapshot of the network services and their vulnerabilities. However, this is only from an external perspective. Accordingly, it is important to determine active local services, and to identify the security exposures from a configuration perspective while identifying the settings that can result in initiating a local attack or in exposing the system to external attacks that are not detected through an external scan.

2. Managed Web Applications Assessment

  •  We assess the security of the web applications to identify flaws that can threaten online services, or jeopardize the confidentiality of the information, including:
  •  Identifying OWASP TOP 10 Risks, and OWASP vulnerabilities, scan for SQL Injection, XSS, CSRF, URL redirection, and learn how to mitigate these threats.

3. Managed Compliance & Configuration Audit

To ensure IT assets compliance with policies and standards, we provide more than 450 audit policies for a wide range of assets and standards, including:

  •  Operating systems
  •  Databases
  • Applications
  • Network infrastructure
  •  Virtual infrastructure
  •  Sensitive content
  • Anti-virus
  • Our audit policies have been certified by the Center for Internet Security (CIS).

4. Managed MDM Configuration Audit

  •  Gain control over BYOD policies (bring your own device).
  •  We ensure that MDM policies are correctly set in accordance with industry standards. (MDM: mobile devices management for tablets, laptops, and smartphones).

5. Managed Mobile Device Scan

 Network-based scanning is not the right approach to identify vulnerabilities on mobile devices, since most devices are in “sleep” mode, and/or using a 3G/4G network. We access mobile devices via Microsoft Exchange or MDM to gather information about the type of devices, users, and mobile device vulnerabilities.

6. Penetration Testing Services

Pen testing simulates a real hacker activity on networks, applications, devices, and/or people to evaluate the security level of key systems and infrastructure to determine what is needed to boost systems security.

Benefits

We provide a timely snapshot of the network services and their vulnerabilities
We assess the security of the web applications to I dentify flaws that can threaten online services
we provide more than 450 audit policies for a wide range of assets and standards.