Why do a Vulnerability Scan
Vulnerability scanning is at the forefront of adding security to your organization. Do you know what is on your network? Are your systems patched? How do you verify that the patching was successful? We can help you answer these questions with a scan.
How it works
Our vulnerability scan looks across your network to detect and classify issues. We scan the network to find all connected computers, printers, and communication equipment. Vulnerable systems on the network are identified so you can prioritize remediation.
Vulnerability Testing Process
2 - Testing
- Test Analyst run testing tools
- Manual tests are performed as necessary
- Test Data is compiled
1 - Process Start
- Sign NDA
- Review Process
- Create Test Plan
- Install Hardware/Software
- Establish Test Time-frame
3 - Reporting
- Meet w/ Cubed Corps & discuss findings
- Feedback / Q&A
- Discuss future engagement
Scans are only good for a short period of time as infrastructure is not static. We recommend scanning your systems a minimum of one time per year. Quarterly scans are even better. Additionally, we can set up continuous monitoring if your business needs demand.
Reporting is the final stage of the assessment process. Analyst aggregate the information from testing to provide the client with comprehensive details.
The report contains a high-level breakdown that highlights the issues. Aside from the issues we will let you know what is being done right.
We also include recommendations to help business leaders make informed decisions.
The report breaks down each vulnerability in detail, including the testing process and remediation steps. This makes it simpler for the IT team to make decisions on how to fix vulnerabilities. We go to great lengths to ensure each report is both explicit and easy to navigate.
Upon client request, Cubed Corps will review an assessment after vulnerability is patched. We will ensure changes got implemented properly, and the risk eliminated. A new assessment will be created that reflect the more secure state of the application.