A fundamental part in keeping assets secure is to continuously uncover and mitigate vulnerabilities in IT systems and infrastructure. Addressing and mitigating technical vulnerabilities fast and effective reduces the likelihood of them being exploited by an attacker, which can lead to loss of sensitive information or incidents that effect the daily operations of the organization. It is a risk-reducing process that all organizations should perform. Identifying vulnerabilities is the first step of this process, and this is where vulnerability scanning is relevant.
Vulnerability scanning is also often a recommendation or a requirement in local laws, international standards or other compliance requirements, for example:
A vulnerability scan is an automated, high level test that looks for and reports potential vulnerabilities (for example EternalBlue MS17-010 and Ripple20 CVE-2020-11896 - CVE-2020-11914) and security misconfigurations in services, applications, servers, etc. Reports from vulnerability scans should contain technical information about the vulnerability, including where it was uncovered, the risk and recommendations for mitigation.
To get full effect of vulnerability scanning it must be performed regularly and configured properly. Configuring, scheduling and processing the results are time consuming activities and to be done correctly, require a high level of technical skill in both information security and IT in general. A misconfigured vulnerability scan will in best case report false-positive results, and in worst case harm running services.
Regular scanning will help keep a continuous overview of exposed risk, making it possible to report on trends, time to mitigate and other important parameters necessary to comply with company policies.
Watchcom is a well-renowned provider of managed security services and has years of experience delivering vulnerability scan as a service for a broad specter of customers in several sectors. The service has been developed over time to meet customers need and adopted to the rapidly changing threat landscape.
Our security analysts are experts in performing vulnerability scans and interpret the results. They are experienced and used to present results for both technical personnel and management. The team working with vulnerability scan holds several relevant certifications making us able to deliver a professional and qualitative service, keeping customers satisfied.
The value our experienced team brings to vulnerability scans, both in configuring and reporting on the results, differentiate us from our competitors. We are here to help you in prioritizing and understand the risk posture related to your vulnerabilities.
Detects and gives you a valuable tool to mitigate vulnerabilities in your systems exposed to the internet
Detects and gives you a valuable tool to mitigate vulnerabilities in your internal network. We offer both traditional centralized scanner methodology our agent-based scanners to ft your needs.
Specially designed components used to detect and mitigate vulnerabilities in systems in your cloud-based deployments.
A basic scanning service, that performs regular automated security scans and produces informative and processable reposts
A more advanced service that in addition to regular scanning also offers validation and analysis of uncovered vulnerabilities. In addition to reports this service also includes regular status meetings with security experts to discuss and help the Client with handling of vulnerabilities.
Watchcom can also deliver customized services if any the two other levels do not meet the client requirements.
The reporting, both technical and non-technical, will be customized to give the correct data for the customers security requirements. These reports are discussed on regular status meetings, where an analyst will be available to answer questions from management or technical staff. Through the meetings and the reports we will help address trends and establish routines to strengthen your overall security.
The monthly report will give a non-technical overview of the assets, the overall risk in the network and a technical summary of all the uncovered vulnerabilities. The overview contains graphs and tables which sums up the vulnerabilities and indicates trends.
The technical summary contains detailed information of the vulnerabilities, making it possible to recreate them, and gives recommendations of mitigation techniques.
Our reports are structured based on customer feedback to provide an easy-to-understand overview of your
vulnerabilities and include the following:
Periodic Summary - Our senior analyst team creates a high level easy to read summary commenting high-level the results for the latest month.
Scope Overview - Gives you a clear understanding of which targets that are included in the report.
Top 10 Vulnerabilities - The most critical vulnerabilities listed first. Discovery method and remediation suggestions is included.
Visualization of Trends - Usable to track the changes in the vulnerability count over time.
Overview of Scanned Websites - Gives you a clear understanding of which websites that are included in the report.
Overview of Scanned IP-addresses - Gives you a clear understanding of which IP-addresses that are included in the report.
Reports from our service helps adhere compliance to the following standards:
FFIEC, FISMA, CyberScope, GLBA, HIPAA/HITECH, NERC, PCI, SCAP, SOX
CERT, CIS, COBIT/ITIL, DISA STIGs, FDCC, ISO, NIST, NSA