Performing a network vulnerability assessment is an important part of maintaining a strong security posture and is a common requirement of compliance regimes. Even the best IT staff with clear policies can make configuration mistakes, and the list of known vulnerabilities changes constantly. Network vulnerability scanning allows you to identify all devices on your network and determine if any have known vulnerabilities or configurations that put your network at risk. This scan can also be directed at your perimeter to ensure that the services you expose are secure. As with all our services, Truvantis scales industry best practice to suit your budget and risk tolerance.
A vulnerability assessment is used to find:
- Unsecured/unknown devices
- Open ports and services
- Perspective is the network layer inside and outside the firewall
We utilize the market-leading QualysGuard® Vulnerability Management Service to perform network scans, operated by our QualysGuard Certified staff. Most importantly, you will be guided through the entire process, including choosing what to test, performing the testing, analyzing the results and evaluating tradeoffs between security and business impact.