A fundamental part in keeping assets secure is to continuously uncover and mitigate vulnerabilities in IT systems and infrastructure. Addressing and mitigating technical vulnerabilities fast and effective reduces the likelihood of them being exploited by an attacker, which can lead to loss of sensitive information or incidents that effect the daily operations of the organization. It is a risk-reducing process that all organizations should perform. Identifying vulnerabilities is the first step of this process, and this is where vulnerability scanning is relevant.
Vulnerability scanning is also often a recommendation or a requirement in local laws, international standards or other compliance requirements, for example:
A vulnerability scan is an automated, high level test that looks for and reports potential vulnerabilities (for example EternalBlue MS17-010 and Ripple20 CVE-2020-11896 - CVE-2020-11914) and security misconfigurations in services, applications, servers, etc. Reports from vulnerability scans should contain technical information about the vulnerability, including where it was uncovered, the risk and recommendations for mitigation.
To get full effect of vulnerability scanning it must be performed regularly and configured properly. Configuring, scheduling and processing the results are time consuming activities and to be done correctly, require a high level of technical skill in both information security and IT in general. A misconfigured vulnerability scan will in best case report false-positive results, and in worst case harm running services.
Regular scanning will help keep a continuous overview of exposed risk, making it possible to report on trends, time to mitigate and other important parameters necessary to comply with company policies.
Watchcom is a well-renowned provider of managed security services and has years of experience delivering vulnerability scan as a service for a broad specter of customers in several sectors. The service has been developed over time to meet customers need and adopted to the rapidly changing threat landscape.
Our security analysts are experts in performing vulnerability scans and interpret the results. They are experienced and used to present results for both technical personnel and management. The team working with vulnerability scan holds several relevant certifications making us able to deliver a professional and qualitative service, keeping customers satisfied.
The value our experienced team brings to vulnerability scans, both in configuring and reporting on the results, differentiate us from our competitors. We are here to help you in prioritizing and understand the risk posture related to your vulnerabilities.
Detects and gives you a valuable tool to mitigate vulnerabilities in your systems exposed to the internet
Detects and gives you a valuable tool to mitigate vulnerabilities in your internal network. We offer both traditional centralized scanner methodology our agent-based scanners to ft your needs.
Specially designed components used to detect and mitigate vulnerabilities in systems in your cloud-based deployments.
We offer vulnerability scanning on two different levels:
With "Vulnerability Management as a Service", our analysts will not only setup and perform the regular scanning and monthly reporting, but also help verify the vulnerabilities detected and priorities them. In addition to the monthly report, new critical vulnerabilities discovered in a scan are reported immediately, after it has been verified for correctness by an analyst.
The reporting, both technical and non-technical, will be customized to give the correct data for the customers security requirements. These reports are discussed on regular status meetings, where an analyst will be available to answer questions from management or technical staff. Through the meetings and the reports we will help address trends and establish routines to strengthen your overall security.
The "Vulnerability Scan as a Service" is a more basic service, where scan results are reported directly to the customer monthly, in easy-to-understand reports. In addition to the monthly report, new critical vulnerabilities discovered in a scan are reported immediately.
The monthly report will give a non-technical overview of the assets, the overall risk in the network and a technical summary of all the uncovered vulnerabilities. The overview contains graphs and tables which sums up the vulnerabilities and indicates trends. The technical summary contains detailed information of the vulnerabilities, making it possible to recreate them, and gives recommendations of mitigation techniques.
Our reports are structured based on customer feedback to provide an easy-to-understand overview of your
vulnerabilities and include the following:
Periodic Summary - Our senior analyst team creates a high level easy to read summary commenting high-level the results for the latest month.
Scope Overview - Gives you a clear understanding of which targets that are included in the report.
Top 10 Vulnerabilities - The most critical vulnerabilities listed first. Discovery method and remediation suggestions is included.
Visualization of Trends - Usable to track the changes in the vulnerability count over time.
Overview of Scanned Websites - Gives you a clear understanding of which websites that are included in the report.
Overview of Scanned IP-addresses - Gives you a clear understanding of which IP-addresses that are included in the report.
Reports from our service helps adhere compliance to the following standards:
Compliance auditing:
FFIEC, FISMA, CyberScope, GLBA, HIPAA/HITECH, NERC, PCI, SCAP, SOX
Configuration auditing:
CERT, CIS, COBIT/ITIL, DISA STIGs, FDCC, ISO, NIST, NSA