Define, identify and classify vulnerabilities
The objective of a vulnerability assessment is to maximize the overall security of your environment and to discover and remediate vulnerabilities before attackers exploit them. The vulnerability assessment evaluates if and where your systems are open to attack through known vulnerabilities; this is the Achilles heel where the vast majority of successful breaches to your systems occur.
The tools we use are conceptually the same type of tools that attackers use. This enables us to find the vulnerabilities that an attacker is likely to find.
Detect vulnerabilities, both from the outside and from the inside
Our Vulnerability Assessments are performed both from outside our networks and from inside our networks, with full access to the environment it is testing. This ensures that we find not only the vulnerabilities exposed to the outside world, but also vulnerabilities that could be leveraged in the event that someone gains access to the internal network.
How does it work?
A member of our security team and your Service Manager at Basefarm work with you to specify which applications are in scope for the tests and the timing for conducting the test.
Typically, the tests are done off-peak hours:
for instance, 00:00 – 05:00 on weekdays.
Once the tests have been concluded, the security engineer provides you with a report describing the vulnerabilities that were found together with suggested remediation actions.