External security only forms a small part of an organization’s general security profile and that internal security is also of absolute importance.
We therefore came up with a new reasonably priced offer for a service that remotely assess internal vulnerabilities.
Our qualified staff has, over the years, acquired experience in performing IT review and testing services as well as working on security assessment of internal networks and systems in over one hundred financial institutions across the world. In order to clear any possible doubts you may have regarding the “vulnerability assessment service” we offer, the following is a compiled list of the most frequently asked questions that usually come from our clientele.
We are happy and able to provide you with a list of customers’ references should you ask for them. Our auditing personnel is made up of consummate professionals who have years of experience in the healthcare, banking, transportation, real state and education industries.
One of the features that sets us apart from other companies is the way in which we organize our IT auditing teams. We have had the privilege of constructing teams that consist of personnel specialized in different areas of security. Our teams generally include experienced personnel in the management of complex network environments and personnel with a more traditional IT auditing experience, because they usually have a better insight into internal control systems and auditing practices.
During the assessment services, you will work with one of our experienced IT technical auditors, which gives our firm the ability to thoroughly analyze the findings in our review in conjunction with your internal IT personnel or with your external network services provider. Furthermore, we also filter false positives or errors stemming from our automated tools before providing you with the final report; which puts us ahead of the many other service providing firms that have the tendency to force the burden of filtering all the false positives onto your organisations’ security personnel.
The tools that we use:
We use tools that form part of the Kali Linux distribution such as Burp Suite, DirBuster, NMAP, SQLMap, and OWASP ZAP. The tool or tools that is selected to perform the task may vary and is suited to the organization’s respective security specialist or expert’s perception, since they are accurately assessed according to the environment in which they are going to be used. As a rule, we will only use subscription-based tools to guarantee the updating of files and consequently, ease the detection of recently arisen vulnerabilities.
How often is the assessment?
The general recommended practice is that every organisation should perform a vulnerability assessment test at least once a year or after any important changes in the organisation’s operations or patch solutions. Our fee covers one single assessment at any time of your choosing. We also offer frequent testing intervals at a discounted price. An internal vulnerability assessment is one of the most effective means to verify the efficacy of any parch administrations.
How will you see the results of the assessment?
We issue a formal report of all of our review services. This report will include a general description of the outcomes of the test, as well as any recommendations that may be made regarding the possible solutions. A copy of the complete results of the test will be attached to that report. In order to maintain a standard format we issue all our reports in electronic format (PDF) through our email. It usually takes us about a weeks’ time to publish the report having passed it through our internal quality control function, however, expedited issuance of reports is available upon advance request. You can feel free to contact us if you would like to receive a sample report of the external Vulnerability Assessment test.