paint texture

Network (External) Security Vulnerability Assessment

Using special scanning software, identifies security weaknesses in your internet facing systems.
paint texture
Risk Factory Guarantee Badge

The Risk Factory Guarantee

No questions asked, full refund if you are not 100% happy.
Find Out More
Megaphone paint texture

Factory Fact

The average cost of a security breach for a small company is £115k.
View our resources
Ringing Phone Icon paint texture

Need some help?

Speak to an expert. Contact our “Factory Foreman” and he can answer any questions you may have.

Call us on:
0800 978 8139
Contact Us

get an instant quote

Number of Assessments

Number of IPs

Price: £0.00
Added

What is it?

Using special scanning software, a Network Security Vulnerability Assessment identifies security weaknesses such as configuration flaws, excess builds, missing security patches, updates or fixes or programming errors on your internet-facing systems. It will also examine how your servers appear to users on the internet and pinpoint where information is being exposed which could be exploited by hackers to gain access to your systems and compromise your data.

Why should I do it?

You should do it to “see what a hacker sees”. Conducting this assessment will show you any existing Internet-facing weaknesses that could be exploited by hackers to access your systems. It should give you a clear picture of the security profile of your systems as seen from the Internet.

Vulnerability scanning is also internationally recognised best practice and required for compliance to virtually all governance risk and compliance frameworks.

How often should I do it?

Best practice endorses conducting vulnerability scanning of your systems once every 3 months (quarterly) and after any major changes.

What will Risk Factory do?

  • Identify how many devices on your systems can be seen from the Internet.
  • Identify what operating systems, services and applications these devices are running.
  • Identify security vulnerabilities associated with the operating systems, services and applications.
  • Test each of the vulnerabilities identified against our database of known threats and attacks.

What will I receive?

  • A comprehensive report of the findings detailing a straight-forward explanation of each vulnerability identified and our cost-effective recommendations for mitigating each vulnerability. To see a sample report, contact the Risk Factory Foreman.
  • On-call telephonic support from an information security consultant for two weeks after the scanning to answer any questions you may have about the report or remedial recommendations.
  • A free rescan two weeks after the original scan to ensure recommended remedial actions were effective in mitigating the vulnerabilities originally identified.
  • A certificate of validation for evidence of compliance.

Do I need to prepare anything in advance?

We just need a list of your internet-facing Internet Protocol (IP) addresses. If you don’t know your IP addresses, don’t panic our Factory Foreman can help you.

Also, don’t forget to specify the exact number (quantity) of assessments you’d like to purchase when getting your quote. Our Factory Foreman will call you to schedule each assessment purchased. You can, for example, purchase multiple assessments (for better value) and get them delivered over time when you need them to match your ongoing business requirements.

Please consider updating your browser

This website has been designed using modern web technologies which unfortunately, are not supported by your browser. This means that many parts of the site will not function as intended.