Vulnerability Scanning & Assessment
Secure your Organisation & Satisfy Compliance Requirements
The only way to prevent hackers from exploiting weaknesses in your
corporate defences, is to scan for vulnerabilities before they do.
The only way to prevent hackers from exploiting weaknesses in your
corporate defences, is to scan for vulnerabilities before they do.
Vulnerability Assessment is a process that scans for and identifies security holes within a network or communications infrastructure. Discovery is followed by prioritisation of vulnerabilities and provision of guidelines for counter measures.
Shearwater uses best-of-breed vulnerability scanners to perform all assessments. These include a combination of both commercial and freely available tools to get the best possible coverage and outcome. Our Vulnerability Assessment covers:
Our network vulnerability scanning focuses on scanning network hosts, including connected devices, to find weaknesses. This assessment can also include virtual environments and their host configurations.
This assessment includes testing the application for OWASP top 10 vulnerabilities. Testing can be performed as an authorised and unauthorised user.
Shearwater provides scanning for internal and Internet-facing resources to address the Payment Card Industry Data Security Standard (PCI DSS) requirements.
We test for the presence of unauthorised wireless access points and review the security posture of your wireless network.
Check out our Vulnerability Management Services