Why Vulnerability Management?
Our VM Service
The VM Family of Services
VM Service Levels
Reporting
Compliance and Configuration Auditing
A fundamental part in keeping assets secure is to continuously uncover and mitigate vulnerabilities in IT systems and infrastructure. Addressing and mitigating technical vulnerabilities fast and effective reduces the likelihood of them being exploited by an attacker.
It is a risk-reducing process that all organizations should perform. Identifying vulnerabilities is the first step of this process, and this is where vulnerability scanning is relevant.
Vulnerability scanning is also often a recommendation or a requirement by law, international standards, or other compliance requirements, including:
Regular vulnerability scanning will help keep a continuous overview of exposed risk, making it possible to report on trends, time to mitigate and other important parameters necessary to comply with company policies.
Vulnerability scanning should be performed regularly, and configuring, scheduling and processing results can be time-consuming activities. To do this correctly, it requires a high level of technical skill in both information security and IT in general, and a misconfigured vulnerability scan will in best case report false-positive results, and in worst case harm running services.
As a renowned and experienced provider of MSS, we have developed our services to meet our customers' needs, always adapting to the rapidly changing threat landscape.
Let our certified experts add value to your vulnerability scans, configure and report the results, to assist your organisation in understanding, assessing, and prioritizing the risk posture related to your vulnerabilities.
Perimeter Scanning: Detects and gives you a valuable tool to mitigate vulnerabilities in your systems exposed to the internet
Internal Scanning: Detects and gives you a valuable tool to mitigate vulnerabilities in your internal network. We offer both traditional centralized scanner methodology our agent-based scanners to ft your needs.
Scanning of Cloud Deployments: Specially designed components used to detect and mitigate vulnerabilities in systems in your cloud-based deployments.
Vulnerability Scan as a Service: A basic scanning service, performing regular, automated, security scans and producing informative and processable reports
Vulnerability Management as a Service: A more advanced service that in addition to regular scanning also provides validation and analysis of uncovered vulnerabilities. In addition to reports, regular status meetings with security experts to discuss and help with the handling of vulnerabilities is included.
Customized: We can also deliver customized services where the two fixed levels do not meet your requirements.
Reporting, both technical and non-technical, will be customized to ensure your security requirements are met. The reports are discussed on regular status meetings, where an analyst will be available to answer questions from management or technical staff.
Through the meetings and the reports we will help address trends and establish routines to strengthen your overall security. The monthly report will give a non-technical overview of the assets, the overall risk in the network and a detailed and technical summary of all the uncovered vulnerabilities, making it possible to recreate them, giving recommendations of mitigation techniques.
Our reports are structured based on customer feedback to provide an easy-to-understand overview of your vulnerabilities and include the following:
Reports from our service helps adhere compliance to the following standards: