VULNERABILITY TESTING

What is Vulnerability Testing?

A vulnerability testing service checks either network components (firewalls, routers, servers, etc.) or web application components (websites, portals, restricted web access systems, etc.). The goal of the service is to find loopholes in security, which would allow an intruder to gain unauthorised access.

  • Checking network equipment (servers, routers, etc.) for vulnerabilities

  • Checking web applications (websites, portals etc.) for vulnerabilities

  • Same methods hackers employ prior to hacking into a client network

What Checks are being performed during a vulnerability test?

The checks include the search for known and unknown system or web application vulnerabilities, missing patch levels, out of date operating systems, out of date software revisions as well as open and exposed ports.

  • Known and unknown vulnerabilities in network or web application components

  • Out-of-date software / hardware in use

  • Missing patches

  • Open and exposed services and ports

Why is Vulnerability Testing necessary?

Millions of internet facing customer networks are being attacked on a daily basis. If you care about your IT infrastructure and you want it safeguarded, you should regularly have vulnerability assessments performed, before a malicious hacker exploits potential weaknesses.

How many systems actually do have vulnerabilities?

In our assessments we find that 95% of all of our clients have either at least one or more critical, high or medium severity vulnerability.

Why are there so many vulnerabilities?

IT landscape changes at rapid speed. Businesses use a lot of open source software, don’t maintain latest software revisions, have unnecessary services and port exposed to the Internet but are unaware of the security holes they are introducing.

  • Wrong configuration of servers

  • Running out of date software / missing patch levels

  • Weak application coding

  • Use of open source software

  • Exposing unneeded ports and services to the internet

Difference between a Vulnerability Test and a Penetration Test

A vulnerability assessment is a series of manual investigation / probing as well as automatic scanning and it reports on all known vulnerabilities and flaws found in systems. A penetration test takes the encountered vulnerabilities and flaws and tries to actively exploit them to gain access to the systems like a malicious hacker would so that the report can fully explain the potential problem you are facing. Microsoft Azure penetration testing, AWS penetration testing and Google Cloud penetration testing are all newer forms of
IT infrastructure security testing in recent years but ethical hacking requirements that our team of testers are well skilled in along with the more established vulnerability testing techniques.

VULNERABILITY TESTING PACKAGES

BRONZE Package

  • Network vulnerability testing against specified IP enabled devices

  • Web application vulnerability testing against specified web apps

  • Service can contain external and internal vulnerability assessments

  • Executive summaries, in-depth technical report and mitigation advice

  • One time off or yearly test

SILVER Package

  • Network vulnerability testing against specified IP enabled devices

  • Web application vulnerability testing against specified web apps

  • Service can contain external and internal vulnerability assessments

  • Executive summaries, in-depth technical report and mitigation advice

  • Twice a year testing package (10% discounted)

  • Delta report comparison to the previous report

GOLD Package

  • Network vulnerability testing against specified IP enabled devices

  • Web application vulnerability testing against specified web apps

  • Service can contain external and internal vulnerability assessments

  • Executive summaries, in-depth technical report and mitigation advice

  • Quarterly testing package for maximum protection (20% discounted)

  • Delta report comparison to the previous report

Download Flyer and Sample Reports

References and Certifications

If you would like to speak to one of our existing customers, we are happy to arrange that. Please note that a lot of customers wish to remain anonymous and not to serve as a reference due to the sensitivity of the work we perform. Naturally we always comply with our customers. We do however have some clients who are happy to serve as references. Should you require validation of our consultant’s certifications, we can arrange that as well.